Vulnerability Assessment

Stay one step ahead by determining weaknesses in your environment that could be brought on by both external and internal threats.

Overview

Redspin performs both external and internal vulnerability assessments. 

External Vulnerability Assessment

Evaluate the overall security posture of the enterprise from the perspective of an anonymous source on the internet. Our methodology starts with a process called “fingerprinting,” during which time we do reconnaissance on the target organization by reviewing public sources of information (such as the network registrars, DNS servers, email servers, routing tables, public special interest groups, etc.) to evaluate the potential information that is available for an anonymous attacker to gather as base information to start an attack or even feed into a parallel route that might exploit non-technical weaknesses (Social Engineering).

Internal Vulnerability Assessment

Differ from external assessments in that the goal is to evaluate the overall security posture of the enterprise against potential attacks from “insiders,” other trusted parties, or an attacker who has already successfully penetrated the perimeter of the organization. In conjunction with architecture assessment and technical testing, we perform extensive root cause analysis prior to compiling a summary report of findings.

Key Benefits

47@1x

Clear Picture of Risk

With detailed reporting and assessment that’s customized for your organization, you get a clear, comprehensive view of your security risk profile. This is particularly helpful during the merger and acquisition process, to check the risk profile of the entity being acquired. 

49@1x

Multifaceted Approach

Attacks often come from external sources, but threats can come from within your own network or as the result of a previously unidentified breach. That’s why Redspin’s Vulnerability Assessment comprises both external and internal evaluations.

07@1x

Find Flaws

Ideally, a Vulnerability Assessment affirms that your organization is doing everything right, but it will find any gaps in policies, procedures, practices, or processes so you can remediate them.

10@1x

Remediation Guidance

Give key stakeholders tactical guidance on how to fix any issues that the Vulnerability Assessment uncovers, so your particular organization can more effectively drive technical remediation efforts.

Outcome

After a Vulnerability Assessment, your organization will have a complete picture of any vulnerabilities it has to external and internal threats, as well as recommendations for how to remediate those threats.

Related Resources

Get Started with Redspin Today

Assess. Build. Manage. Validate.

Subscribe to our newsletter