Need help? Call Customer Support | 800-301-3894

Vulnerability Assessment

Vulnerability Assessment is the detailed examination of IT system and infrastructure configurations to determine their security posture, find and document vulnerabilities and produce recommendations to enhance security. 

  • Perimeter - Assess border systems such as firewalls, external security systems, routers, switches and hosts on the Internet-facing portions of the client's network, in inter-organizational DMZs and partner-facing networks.  The assessment examines the configurations of the target systems and services visible from outside the organization.  The assessment may also include hosts available through dial-up (modem) access.  
  • Internal - Assess internal servers, network infrastructure, security systems and standard client host builds.  The assessment may also assess systems in DMZs from an internal perspective.