Vulnerability Assessment

InfoSight's Vulnerability Assessment Services

Security analysts will conduct an examination of the potential vulnerabilities to your perimeter network to ensure that proper security safeguards are in place to protect valuable assets and confidential information against unauthorized access that could have potentially catastrophic and costly consequences. Examination of the potential vulnerabilities to the perimeter network will be performed under the premise of a "Zero Knowledge Attack," gathering publicly available information about public records and websites available on the Internet to discover potential security vulnerabilities. In addition, physical sites, systems and applications will be probed, and other tests will be performed to identify potential security weaknesses and for potential penetration testing. The eVA final report will include a grading format ranging from "Severe to Low," with recommendations for remediation and possible solutions.

INFOSIGHT's security professionals will conduct examinations of the potential vulnerabilities to the internal network to ensure effective security safeguards are in place to protect against trusted and unauthorized access to internal assets. With this assessment, we will look beyond the perimeter network to explore LAN/WAN hardware, software applications, Operating Systems, and Network devices. The Final Report will include a grading format ranging from "Severe to Low," again with recommendations for remediation. Recommendations generally include but are not limited to the following: Sample configurations, Patch and service pack recommendations, Training – Technical and/or Security Awareness, Best Practice and Vendor specific recommendations.

Our Vulnerability Assessment methodology includes:

  • Gathering information about the target before the test (reconnaissance)
  • Identifying all possible entry points, vulnerabilities, and weaknesses
  • Attempting an exploit to gain entry
  • Reporting back findings and providing detailed instructions for remediation

Comprehensive Vulnerability Assessment services offer complete on-site assessments of your enterprise security infrastructure and information security effectiveness, both internally and externally. INFOSIGHT will identify areas to defend your network from the inside out using additional services such as Social Engineering and Email Phishing to maximize the security of your organization’s valuable information assets. This important and vital service assesses the technical security of your computer systems, the physical security of your material workspaces, and the aptitude of your organization's information security policies, procedures, and processes. A CVA provides a comprehensive and holistic approach to validating vulnerabilities, thus strengthening your company's enterprise security programs.

InfoSight can provide your organization with the assistance you need for effective email social engineering prevention. Training your people is always a good place to start when managing the quality of your security profile. If you would like more information about email social engineering contact us at info @ InfoSightInc.com.

Here are some questions to ask to determine how vulnerable your network may be:

  • How long ago was my last vulnerability test?
  • How many changes and or upgrades has my network had since my last vulnerability test?
  • Do the counter measures I have in place to prevent an intrusion actually work?
  • What security layers should I implement next to best protect my company's assets?
  • Do I know where confidential and sensitive data is located on my network enterprise wide?
  • How do I know if my IT Security reports are accurate?

If you would like more information about Vulnerability Assessment, contact us at InfoSightinc.com.

Request More Info

Vulnerability Assessment