Vulnerability Scans
Vulnerability scanning is an automated process that examines your computer, system, or network for security weaknesses. These scans use a database of known vulnerabilities and check if those vulnerabilities actually exist in your systems.
1
Network Scan
Focuses on identifying network vulnerabilities. This includes network services, devices, firewalls, etc.
2
Host-based Scan
Focuses on identifying vulnerabilities in specific hosts and servers. This includes checking the operating system and installed applications for misconfigurations.
3
Application Scan
Focuses on identifying vulnerabilities in web applications. This includes application layer vulnerabilities such as SQL injection, cross-site scripting, etc. as well as API's.
4
​Database Scan
Targets databases to identify security weaknesses or misconfigurations that can allow unauthorized access or data leakage.
Contact Us
Please feel free to contact us with any questions regarding our products or services.