Pre-Engagement
An initial discussion on the assessment scope, understanding any compliance requirements, the overall threats associated with your business and how often scanning should be conducted.
Deploy semi-automated vulnerability scanning of your digital assets to identify security weaknesses and associated risks to your business. Find out how a vulnerability assessment can help reduce your attack surface.
Deploy semi-automated vulnerability scanning of your digital assets to identify security weaknesses and associated risks to your business. Find out how a vulnerability assessment can help reduce your attack surface.
Get StartedBy scanning for security holes and weaknesses, you can ensure that a security breach is not in progress while identifying any potential opportunities for attackers.
Regular vulnerability scanning against your infrastructure will give your business the assurance that any preventative measures in place are operational and continuous. Ensure that your business assets haven’t gone unpatched.
Vulnerability scanning allows your organisation to gain a solid understanding of your inventory of assets. Our discovery scanning can help you identify what’s in your network, ensuring that you’re protected from the unknown.
An initial discussion on the assessment scope, understanding any compliance requirements, the overall threats associated with your business and how often scanning should be conducted.
Reconnaissance and host identification allow us to determine what business assets are in scope for vulnerability scanning. This discovery phase establishes a picture of your network.
Our vulnerability scanning toolset is configured and launched. The previously identified assets are programmatically scanned for security vulnerabilities and known weaknesses.
The scanning output results are verified for false positives and accuracy. Duplicate findings are removed and a custom, detailed report on the identified issues is written.
A post engagement remediation meeting is held. Clearfin will be available for remediation guidance and will conduct additional scanning to ensure determined vulnerabilities have been appropriately patched.
An initial discussion on the assessment scope, understanding any compliance requirements, the overall threats associated with your business and how often scanning should be conducted.
Reconnaissance and host identification allow us to determine what business assets are in scope for vulnerability scanning. This discovery phase establishes a picture of your network.
Our vulnerability scanning toolset is configured and launched. The previously identified assets are programmatically scanned for security vulnerabilities and known weaknesses.
The scanning output results are verified for false positives and accuracy. Duplicate findings are removed and a custom, detailed report on the identified issues is written.
A post engagement remediation meeting is held. Clearfin will be available for remediation guidance and will conduct additional scanning to ensure determined vulnerabilities have been appropriately patched.
An initial discussion on the assessment scope, understanding any compliance requirements, the overall threats associated with your business and how often scanning should be conducted.
Reconnaissance and host identification allow us to determine what business assets are in scope for vulnerability scanning. This discovery phase establishes a picture of your network.
Our vulnerability scanning toolset is configured and launched. The previously identified assets are programmatically scanned for security vulnerabilities and known weaknesses.
The scanning output results are verified for false positives and accuracy. Duplicate findings are removed and a custom, detailed report on the identified issues is written.
A post engagement remediation meeting is held. Clearfin will be available for remediation guidance and will conduct additional scanning to ensure determined vulnerabilities have been appropriately patched.
Web application scanning involves crawling the website in scope while documenting the technologies in use. Simulated attacks are performed against the application and the results are analysed. Web app scanning includes, but is not limited to:
Network scanning discovers and fingerprints the devices on the network in scope and performs various checks on the host's response to determine if vulnerabilities or security weaknesses are present. Network scanning includes, but is not limited to:
This form of scanning identifies vulnerabilities that may exist beyond your primary security perimeter. Internal scanning identifies security weaknesses from inside your business’ network.
This scanning type assesses your external security perimeter from the perspective of an outside attacker. Vulnerabilities identified here will be public-facing and available to everyday internet threats.
We take pride in our ongoing security research and vulnerability documentation. Our unique reporting and management process ensures that remediation is as frictionless as possible. Leave us your email below to request a sample report.
A vulnerability scan or assessment is a high-level, semi-automated test that looks for signs of vulnerabilities and potential weaknesses on the targets in scope. Penetration testing, on the other hand, is a manual, hands-on process that involves engineers performing fingerprinting, enumeration and actively exploiting identified issues on the targets. Exploitation allows for a true understanding of business risk and can involve chaining multiple vulnerabilities together to increase the overall severity.
It is very unlikely that any disruption will occur from our services. Our scanning tools can be configured to ensure that network bandwidth is not limited. Vulnerability scans can also be scheduled to run during non-peak business hours.
Our primary vulnerability scanning software is Nessus. We also use other multi-purpose vulnerability scanning tools to ensure better coverage of the target. Additionally, our own scripts and tools are used on a vulnerability-specific basis to perform verification of identified findings.
The duration of a vulnerability scan is dependant on the scope. Typically, a vulnerability scan, after configuration, is conducted over a day period. Once the scanning is complete, our verification and reporting process takes on average three business days.