We use cookies to personalise this site. Please read our Privacy Policy for more information.OK

Vulnerability Scans

Introduction

Vulnerability scanning is an inspection of computer or network to identify security weaknesses, possibly caused by outdated software, operating systems or configurations. It runs from the point or view of the person inspecting the computer in question, and the scanning software compares details about the vulnerability found to a database of information about known security issues.
Vulnerability scans can be done using either as an authenticated or unauthenticated user. The unauthenticated scan is similar to what a hacker would do to discover possible attack surfaces in a system, wheras an authenticated scan uses the credentials of an user that is trusted on the system and has higher privilages to discover vulnerabilities.

Benefits

Identify vulnerabilities within your organisation.
Improve your company's security posture.
Comply with regulatory bodies that require vulnerability scans to be conducted.
Show your customers that you are taking necessary precautions.
Identify and prioritise high-risk items.

Services

In addition to providing a basic vulnerability scanning service, Jovasi Technology can include the vulnerability scans within another package or certification, such as Cyber Essentials or Security in a Box service.

Onsite & Remote

  • Onsite vulnerability scan.
  • External vulnerability scan.
  • Vulnerability scan report.
  • Technical support.

From £850 +VAT

Quote

All our testers are CREST and NCSC based Cyber Essentials certified testers and hold UK SC clearance.

Frequently Asked Questions

  • What's the difference between vulnerability scans & penetration testing?Whilst they are very similar, and more or less have the same goals - there are some differences.

    Vulnerability scans tend to be performed using automated scanning tools to discover weaknesses within a system (possibly caused by outdated software). However, vulnerability scans do not exploit the weaknesses further.

    Penetration testing uses a range of tools to exploit weaknesses (similar to what a hacker would do).
  • Where is the testing performed?Vulnerability scans must be performed on your internal network. This usually requires an onsite visit by one of our testers, but we also provide a remote scanning appliance as part of our 'Security in a Box' service.
  • How is severity determined?The vulnerability score is based on the Common Vulnerability Scoring System v2 (CVSS v2), which is an open industry standard. The severity can range from 0 to 10 (with 10 being the most severe).
  • How long will the scanning take?This depends on how many devices you have and how many sites need visiting. In reality, it can take anything from 30 minutes to about 8 hours.

Certifications & Accreditations

Contact Us

You can telephone us on +44 (0)330 043 2575, or by clicking the button:

CallContact Us