Regular vulnerability scanning is a type of test used to detect ever-evolving Cyber Security threats against corporate assets. With periodic vulnerability scanning tests, IT assets are tested and vulnerabilities on these assets are detected. The gaps found and the methods of removing these gaps are submitted to the institution as a report at the end of the test. Periodic vulnerability tests, unlike penetration tests, focus on detecting vulnerabilities and do not contain infiltration attempts. Periodic vulnerability tests are performed every six months, twice a year, and new vulnerabilities or vulnerabilities resulting from configuration changes are identified and reported. Periodic tests are followed by the central monitoring tool developed by us. This software enables comparing the findings of the organization's weaknesses identified as a result of vulnerability testing, corporate risk report is created, and this report is presented as the final test report to the institution. Within the scope of this service, the security of the IT infrastructure will be tested by performing vulnerability tests from outside to inside and from inside to inside. Thus, before an attack occurs, possible entry points will be identified and these weaknesses will be eliminated.
This service includes the following service titles as a minimum:
- Data collection
- Network Mapping
- enumerating
- Vulnerability Detection
- exploitation
- Upgrade Rights
- Web Application Security Tests
- Client Side Penetration Tests
- Decommissioning Tests
- Database Vulnerability Tests
- Wireless Network Penetration Tests
- Validation Check