Redspin performs both external and internal vulnerability assessments.
External Vulnerability Assessment
Evaluate the overall security posture of the enterprise from the perspective of an anonymous source on the internet. Our methodology starts with a process called “fingerprinting,” during which time we do reconnaissance on the target organization by reviewing public sources of information (such as the network registrars, DNS servers, email servers, routing tables, public special interest groups, etc.) to evaluate the potential information that is available for an anonymous attacker to gather as base information to start an attack or even feed into a parallel route that might exploit non-technical weaknesses (Social Engineering).
Internal Vulnerability Assessment
Differ from external assessments in that the goal is to evaluate the overall security posture of the enterprise against potential attacks from “insiders,” other trusted parties, or an attacker who has already successfully penetrated the perimeter of the organization. In conjunction with architecture assessment and technical testing, we perform extensive root cause analysis prior to compiling a summary report of findings.
After a Vulnerability Assessment, your organization will have a complete picture of any vulnerabilities it has to external and internal threats, as well as recommendations for how to remediate those threats.
Get Started with Redspin Today
Assess. Build. Manage. Validate.