Network Vulnerability Assessment

Network Vulnerability Assessment

A Network Vulnerability Assessment is a great way to check the security of a network and determine its susceptibility to hackers. This is accomplished using a specialized scanning and assessment process to identify common threats such as:

• Outdated server OS and software versions
• Insecure/deprecated server settings
• Default or easy-to-guess login credentials
• Unencrypted protocols
• Excessive access for anonymous/guest user accounts

Company servers contain a wealth of valuable and sensitive information, and hackers are relentless to steal that data. This service will help ensure you’re not leaving the proverbial key under the mat or the window unlocked!

Tanner’s Network Vulnerability Assessment Process

We believe that a vulnerability assessment should provide actionable information to the customer, regardless of their level of technical knowledge or expertise. Traditional “vulnerability scans” create reports that are hundreds of pages long and provide overly generic recommendations. Our goal is to provide detailed, yet concise reports that will convey the identified risk to the CEO, while providing the IT department with the recommendations and information necessary to fix the problems.

Over 6,000 vulnerabilities were publicly released and documented in 2015 alone; that’s an average of over 500 per month! Due to the rapidly evolving nature of network security, we strongly encourage companies to sign up for recurring vulnerability assessments. Monthly Network Vulnerability Assessments are the simplest way to keep a pulse on the security of a network and ensure a timely response to future threats.

Deliverable

After performing a detailed assessment of the organization’s servers and systems, Tanner will deliver a report containing the following information:

• Executive summary
• Number and severity of the discovered vulnerabilities on the network
• Pattern of risk from last assessment (for recurring assessments)
• The risk-level of each identified host
• Prioritized action plan to fix the identified vulnerabilities and increase the security of the network

Additionally, you will be given direct access to an experienced Information Security Analyst who can answer any questions about your report, the discovered vulnerabilities or recommended action plan items.