In order to be able to defend your environment from any attack, it is vital to identify your attack surface and ensure you mitigate any vulnerabilities accordingly. We have a six phase approach to establishing a vulnerability management framework for your business:
Discover: It all starts with mapping your network. At this phase we will identify what type of devices you have, where are those placed within your infrastructure, what are your critical assets and if there are any rogue devices present.
Scan: Once we have determined what the scan scope is we will then scan your assets for any vulnerabilities present.
Analyse: After the scan is performed we will analyse the scan results to be able to provide you with the most detailed picture of what vulnerabilities are present in your infrastructure.
Report: We provide a detailed report customised for your needs (i.e. severity category, critical asset type, CVSS scoring and many more).
Mitigate: At this step we will work with your internal teams (and/or any third parties you may use) in order to ensure that the identified vulnerabilities are mitigated appropriately within your network.
Verify: After the mitigation phase has taken place, we will run a new scan to verify that the pre-mentioned issues have been properly remediated.
We use various tools and can also help you in selecting an appropriate tool moving forward in order to ensure your vulnerability management program meets all your needs.