Network Vulnerability assessments

Network Vulnerability Assessment Process


A Network Vulnerability Assessment is a great way to determine a network’s susceptibility to hacking. This is accomplished through a specialized scanning and assessment process that is designed to identify common threats, such as:

  • Outdated server OS and software versions

  • Insecure/deprecated server settings

  • Default or easily-breached login credentials

  • Unencrypted network protocols

  • Excessive access on anonymous or guest user accounts

Company servers contain a wealth of valuable and sensitive information, and hackers know how to access and steal that data. Our network vulnerability management service will help ensure that your network is (and remains) secure.

Tanner’s Network Vulnerability Assessment Process

A vulnerability assessment should provide actionable information to the customer, regardless of their level of technical knowledge or expertise. Traditional “vulnerability scans” create lengthy reports and provide recommendations that might not fit your particular network.

Our goal is to provide you with detailed, yet concise, reports that will convey the identified risks while providing the necessary recommendations and information to fix the problems.

Over 6,000 vulnerabilities were publicly released and documented in 2015 alone; that’s an average of over 500 per month!

Due to the rapidly evolving nature of network security, we strongly encourage companies to schedule regular and recurring vulnerability assessments. Monthly network vulnerability assessments are the simplest way to keep a pulse on the security of a network and ensure a timely response to future threats.

Vulnerability Assessment Deliverables

After performing a detailed assessment of your organization’s servers and IT systems, Tanner will deliver a detailed report containing all of the following information:

  •  Executive summary
  •  Number of the discovered vulnerabilities on the network
  •  Severity assessment of found vulnerabilities
  •  Pattern of risk over recurring assessments
  •  The risk level of each identified host
  •  Prioritized action plan to fix the identified vulnerabilities

Additionally, you have direct access to an experienced Information Security Analyst who can answer any questions you may have about your report, the discovered vulnerabilities, or recommended actions.

Tanner Trust T Logo

Unmatched Industry Experience

With Tanner, you gain access to:

  • Industry analysts with valuable, relevant credentials, including Certified Ethical Hacker (CEH) and Certified Information Systems Security Professional (CISSP)

  • Thorough security assessments based on knowledge and experience

  • Post-engagement reviews (included in our upfront pricing)

  • Complimentary access to a dedicated security analyst for a minimum of one year after any engagement

  • Flexible test scheduling that helps prevent system interruptions

John Pohlman Headshot

John Pohlman

Director of Information Security Services

Contact Us