Testing for your Cyber Security Program

A Vulnerability Assessment is used to evaluate the strength of a cyber security defense against external attack and compromise. Our engineers leverage methodologies from years of Incident Response practice and best-of-breed industry tools to provide the most in-depth and real world scenarios possible. All findings are rated based on risk, probability of exploitation and potential business impacts. To help customers move beyond risk assessment, vulnerabilities and associated findings are delivered with recommendations for mitigating risk and can be merged into a comprehensive solution proposal to help close critical gaps.
V Vulnerability Assessments

Services include

  • Compliance audits related to HIPAA, Sarbanes Oxley, PCI, NIST and ISO
  • Data discovery
  • Network architecture and firewall policy review
  • Internal/external penetration testing and social engineering
  • Wireless security assessments
  • Security program and controls review
  • Firewall policy/network defense audit
  • Workstation and server patch and security posture – vulnerability remediation program/gold image review
  • Cloud and big data security readiness assessment

Used to evaluate the strength of a cyber security defense against external attack and compromise, our engineers leverage methodologies from years of Incident Response practice and best-of-breed industry tools to provide the most in-depth and real world scenarios possible.

Get started
"My most trusted advisors. They have consistently given me solid advice on a range of security challenges our business has faced." Randy YatesDirector of Information Security, Memorial Hermann Hospital
Leading technology partners