Automated Vulnerability Scanning
Identifying cyber security vulnerabilities
What is Automated Vulnerability Scanning?
There are a number of distinct types of Automated vulnerability scan, all of which perform thousands of tests that would take a pen-tester a very long time, in an attempt to highlight potential vulnerabilities within a system. Of these, two are commonly adopted in the ongoing risk-management of successful businesses.
The first type is known as an infrastructure scan and focuses on the devices and networks upon which the business relies to run it’s core IT systems. A scan will typically target web servers, client computers, printers, routers, switches and various other devices that are regularly the target of attack by various threat agents.
The results of these scans make it very clear exactly where the vulnerability lies, what it is and how you can resolve it. This can be anything from indicating a misconfiguration within a device, to identifying un-patched operating systems and default passwords.
- Cost-effective pro-active risk reduction
- Dynamic Application Security Testing (DAST)
- Infrastructure vulnerability testing
- DIY or managed service
- Scan infrastructure and web applications for thousands of vulnerabilities, continuously
- Netsparker, Appcheck and Acunetix partners
The second main type of scan is that of an application, and these days in particular a web application. This type of scan is known as a Dynamic Application Security Test, or DAST. These scanners work by interrogating an application for entry points and functions that can be prodded and poked and fed data with the intention of eliciting results that highlight vulnerabilities in the code and hosting systems. Advanced scanners also allow scripts, APIs and other real-time functions that help the scanner to emulate a real user (by logging in to the system for instance) thus providing a more realistic and thorough scan.
Many standards, including ISO27001, IASME Governance, Cyber Essentials, PCI DSS and GDPR expect that vulnerability scanning should be a key component of the modern business and include provisions within their
Unity Metrix partner with some of the biggest names in vulnerability scanning and are happy to provide licences for internal use of the relevant platform, or a fully managed service, offering monthly reports on security findings. In either case you will have access to full-blown reporting that identifies in details exactly where the issues are and how that can be resolved.
Contact us to find out more about the modern way to manage risk and to take advantage of a free scan and demonstration.
Types of vulnerabilities identified:
- Weak network configuration settings
- Old software and applications
- Insecure login credentials