Vulnerability Management
Introduction

Blanket Security can perform risk assessments, ethical hacking and security reviews to determine your organisation's susceptibility to attack by malicious parties.

Vulnerability Management

Blanket Security takes a holistic view of IT Security and offers vulnerability management as a managed service that encompasses security posture analysis, ethical hacking, vulnerability scanning and remediation.  Our view is to identify your weak points,  create a plan to fix them and do the grunt work for you if needed.

Vulnerability Scanning and reporting

Our vulnerability scanning services are tailored to your specific needs.  We have run scans that range in size from a single server up to 70,000+ IP addresses.  External scans provide and attackers-eye view of your internet facing infrastructure while internal scanners can be dropped inside your network to reveal internal vulnerabilities that could potentially be exploited by malware, worms, advanced persistent threats (APT) or good old disgruntled employees.

Discovery scans can help identify new devices that have been plugged into the network, while infrastructure and web app scans can discover where you’re vulnerable to attack.

We will interpret the results and will provide technical and actionable recommendations to your admins and summary information in plain English for management.

Ethical Hacking / Penetration Testing

Blanket Security has qualified and  experienced ethical hackers that can demonstrate vulnerabilities

Remediation

Once we’ve explained the areas of concern, we are there with you as much as you need to plug the holes and will formulate an on-going plan for continuous vulnerability management.

Helping you get the best results

Blanket Security can assist you with your end-to-end vulnerability management to strengthen your security posture.  Any of these services can be chosen as a one-time engagement to show a snapshot, or an ongoing service that gives data over time to show the executive that you’re diligent in securing your network and applications.

Contact us now!

Feeling freaked out that you might be under attack?  Need to meet compliance requirements but don’t want to pay the uber-price tag of a big 4 consultancy?  Want to know the weaknesses in your network but don’t have the resources or the time to remediate issues?  We love this stuff.  Contact us and we can tailor a solution that meets your requirements and your budget.