iON's Vulnerability Scanning/Penetration Testing will determine the level of protection a company's current measures, procedures and processes provide against compromise of its informational assets, corporate image or legal liabilities.

It measures the success of an organization's implementation of security. Vulnerability issues include design of the perimeter network (router, firewall, DMZ, etc.), security patches, device configuration, and safeguarding information that may aid unauthorized systems access.

  • Quantifies network weaknesses by performing safe, controlled exercises that demonstrate covert and hostile activity typical of attacks
  • Helps ensure the integrity and security of critical online assets
  • Provides a detailed analysis of your network security
  • Provides detailed remediation steps to help prevent network compromise and improve security posture
  • Supports efforts to comply with government and industry regulations
  • Helps to ensure the confidentiality, integrity, and availability of information assets
  • Reduces the risk of regulatory non-compliance
  • Mitigates risk by identifying vulnerabilities before they are exploited by malicious entities
  • Helps continuity of business by reducing network downtime
  • Proven methodology that ensures quality, accuracy, and thoroughness of your assessment
  • Provides confidence that security design and implementation meets industry best practice and regulatory standards

The Vulnerability Assessment and/or Penetration Testing services can be customized to meet the unique needs of the enterprise. These services include the following:

  • Identification of network security risks and vulnerabilities
  • A snapshot view of an organization's network security posture
  • A baseline for future network security initiatives
  • Analysis of risk by exploiting identified security threats and vulnerabilities
  • Validation of current network security posture and countermeasures
  • Validation of risks associated with identified network vulnerabilities and errant configurations

A full security assessment can consist of any combination of the following services:

  • External Audit: Vulnerability Scan and/or Penetration Test of the perimeter network
  • Internal Audit: Vulnerability Scan and/or Penetration Test of the company network
  • Security Policy Compliance Review
  • Security Incident Response Plan Review
  • Systems Administration review
  • Security infrastructure Review - Server / Network / firewall configuration analysis by a iON Expert


Contact iON for a Vulnerability/Scanning Penetration Service quote and options list.




 
 
Current State Assessments