A Proactive Approach to Identifying Vulnerabilities
Vulnerability scanning is a proactive approach to identifying vulnerabilities in your systems and network. The objective is to find flawed areas that leave your organization exposed to malicious attacks. Risks could include: misconfigured firewalls, exploitable DNS configurations, out of date and unpatched software, and unencrypted login credentials. It is important to identify these issues before criminals do.
Pratum provides robust asset discovery and vulnerability scanning in a simple and easy-to-deploy virtual appliance-based system. There is no software to buy, no implementation fees and no costly maintenance fees. Just a straightforward monthly fee per device.
Ready to understand what's happening on your network?
Assessing Security Health
Pratum uses industry leading tools and expert consultants to assess your company’s security health. This enables security decisions to be based on actual threats that directly impact your organization. Decisions based on organizational risk, not fear.
The Scanning Process
The initial phase of the vulnerability scanning process is determining scope by defining the number of assets/devices that will be targeted and scanned. Scans can be authenticated or unauthenticated. Authenticated scans give an insider view into the threat level of each vulnerability. Unauthenticated scans are an external view with no additional insight into vulnerability severity. Each scan type has its advantages, the one that best fits your organization will be defined in this phase.
After defining scope, the scanning will begin. Vulnerability scans are generally scheduled to run monthly or quarterly and are designed to identify cracks in your infrastructure and web applications. Pratum manages the scheduled scans, and every organizations has the ability to perform on-demand scans as needed. This allows clients to check their security health after an update or addition to their systems.
Reporting You Can Understand
Vulnerability reports are detailed and complete, yet they are simple to understand and easy to read. There are a wide variety of stock reports available, everything from executive to highly technical. There is also the ability to create advanced reports utilizing structured database queries. After the scan is performed, reports are automatically generated and delivered to clients based on their reporting preferences.
Vulnerability scanning is always the first step in Penetration Testing. We encourages all of our clients to thoroughly assess the strength of their systems by performing an annual pentest.