Vulnerability Assessment Services

alpine-security-vulnerability-assessment-st-louis.jpg

A Vulnerability Assessment is the process of evaluating assets in an enterprise for security, regulatory compliance, or compliance with a standard. The process identifies and prioritizes vulnerabilities based on criteria such as likelihood of the vulnerability being exploited and the severity of the vulnerability - what the vulnerability provides the attacker when used. These criteria are used to categorize the vulnerability as Critical, High, Medium, Low, or Informational.

We assess systems using vulnerability scanning tools and manual methods to identify and prioritize findings based on the criticality of system vulnerabilities.  We scrub findings to eliminate false positives and prioritize risk, based on existing security controls for your environment.  The Vulnerability Assessment looks for missing patches and existing vulnerabilities for each system.  We use authenticated scans wherever possible to reduce false positives and improve accuracy.

st-louis-vulnerability-assessment.jpg

We typically perform a Vulnerability Assessment on an internal enterprise environment and a Penetration Test against the external, public-facing, systems.  We can, however, perform a Vulnerability Assessment against your external systems and wireless systems as well.

Benefits / Return on INvestment (ROI)

The majority of attacks take advantage of unpatched or misconfigured systems or applications.  Our Vulnerability Assessment service helps you identify vulnerable systems and applications. We provide prioritized, risk-based step-by-step actions to fix the identified vulnerable systems and applications.

ur Vulnerability Assessment not only looks for unpatched systems, but checks for misconfigured systems, applications, and unnecessary services.  Our Vulnerability Assessment service also helps ensure your IT assets are compliant with policy and standards, such as the following:

Source: 2015 Data Breach Investigations Report (Verizon)

Source: 2015 Data Breach Investigations Report (Verizon)

We also make recommendations and can provide expertise on how to properly design, implement, and operate a Continuous Vulnerability Assessment and Remediation program (Critical Security Control 4).

What you get / Deliverables

You get three items:

  1. Vulnerability Assessment Report
  2. Vulnerability Assessment Report Findings Review with your team via an online WebEx session
  3. Discounted Rerun Option for a rerun of the Vulnerability Assessment after you fix identified problems

1. Vulnerability Assessment Report

Sample Vulnerability Findings Graph from Report

Our Vulnerability Assessment Report includes the devices (IP addresses, applications, URLs, etc.) tested, vulnerabilities discovered, steps taken during the assessment, and prioritized recommendations. Our report has many useful elements such as an Executive Summary, Top 5 Findings, Top 5 Vulnerable systems, etc.  

We make every effort possible to produce a report free of false positives and easy to understand.  Our aim is to provide value to you for the purpose of making your environment more secure.

Sample Vulnerability Findings Summary Table from Report

2. Vulnerability Assessment Report Findings Review

We schedule an online WebEx session with you where we walk through the report with your team and answer any questions about the findings, our methods, or the steps required for remediation. Many competitors deliver a confusing lengthy report at the end of the assessment for you to decipher. Our vulnerability assessment report review adds tremendous value because we can clarify findings and remediation steps.

3. Discounted Rerun Option

How do you know the steps you took to fix our vulnerability assessment report findings actually worked? Validation removes the guesswork. When you're ready, after fixing the issues identified in the vulnerability assessment report, we offer a deep discount to rerun the same vulnerability assessment. This is a crucial and often overlooked step in this process. Validating security controls, patches, and other fix actions is extremely important. We have discovered numerous organizations that thought they fixed a finding we identified, only to discover after another assessment that the finding was still there.

Interested in improving your security by identifying vulnerabilities and Fixing them in a step-by-step prioritized manner, based on risk?

Contact Us or use the form for more information about our Vulnerability Assessment services.

Vulnerability Assessment FAQs

What is a false positive?

A false positive is when a vulnerability assessment tool indicates a vulnerability exists - tests positive for the vulnerability, when the vulnerability does not actually exist.  This is a common problem with vulnerability assessments.  Many of our competitors do not eliminate false positives and provide you a lengthy report riddled with false positives.  This wastes your time and will have you chasing ghosts.  We work with you to eliminate false positives by learning your environment, using authenticated assessment scans, demonstrating proficiency in our tools and methods, and by leveraging our experience, team, and expertise.

What is the difference between a vulnerability assessment and penetration test?

A vulnerability assessment is less-intrusive than a penetration test.  With the vulnerability assessment, we identify vulnerabilities, but do not exploit them.  A penetration test goes beyond a vulnerability assessment by exploiting vulnerabilities and seeing how far into your environment an attacker can go by taking advantage of system or application vulnerabilities.

How often should we have a vulnerability assessment performed?

Ideally, you would have a continuous vulnerability assessment and remediation program (Critical Security Control #4).  Organizations that do not routinely scan for vulnerabilities and address these vulnerabilities are more likely to be breached.  We offer a subscription-based Vulnerability Assessment model to help you address the requirement for continuous vulnerability assessment and remediation.

What happens if while performing the vulnerability assessment you discover we already are infected?

This is quite common.  Any existing malware or breaches discovered during the vulnerability assessment will immediately result in a cessation of testing and be brought to the attention of the designated Point of Contact (POC).  We can help with incident response, digital forensics, and malware analysis.

Is the vulnerability assessment performed remotely or onsite?

For an Internal Vulnerability Assessment, we travel to your location and perform this service onsite.  To leverage the fact that we will be traveling to your location, we offer to bundle (at a discount) other services that require us to be onsite with the Internal Vulnerability Assessment, such as our Wireless Security Assessment and Physical Security Review.  

RELATED SERVICES