
Vulnerability Assessment
Proactively assess your network to identify and prioritize your network security threats
- Easy to use self-managed web-based scanning portal which enables you to schedule and run scans as needed
- Perform internal and/or external vulnerability testing to obtain a deeper understanding of your overall security posture
Minimize the risk of a security breach by providing insights and guidance to properly secure your network
- Detailed remediation steps for protecting against identified vulnerabilities detected during your vulnerability assessment
- Unlimited re-scans on your network to assess steps taken to fix vulnerabilities
- Threat intelligence and signature updates consistently updated from multiple security sources to protect against emerging threats and vulnerabilities
Obtain executive level and detailed technical reporting for the vulnerabilities that exist in your infrastructure
- Pass report after assessing there are no existing high or medium level vulnerabilities in your environment
How Vulnerability Assessment Works
External Vulnerability Scanning
External vulnerability scans are scheduled through the Clone Systems Vulnerability Assessment portal. When the scans are executed our scanning infrastructure assesses the hosts identified in the scan criteria against our threat intelligence and signatures in order to identify any existing threats, vulnerabilities or weaknesses. The results are then recorded in our solution and available via the Clone Systems Vulnerability Assessment portal so that you can review remediation steps and take any necessary actions. Upon remediating you can rescan the hosts to determine the status of your security posture.
Internal Vulnerability Scanning
Internal vulnerability scans require you to configure a Clone Systems scanning server within your network. The scanning server can either be a physical server or a virtual server and we support the majority of virtual environments (VMware, VirtualBox, Microsoft Hyper-V, and Citrix XEN to name a few). Upon configuring the internal scanning server and confirming secure connectivity back to the Clone Systems SOC you can schedule the vulnerability scan through the Clone Systems Vulnerability Assessment portal. When the scans are executed our solution communicates directly with the scanning server within your network to assesses the hosts identified in the scan criteria against our threat intelligence and signatures in order to identify any existing threats, vulnerabilities or weaknesses. The results are then recorded in our solution and available via the Clone Systems Vulnerability Assessment portal so that you can review remediation steps and take any necessary actions. Upon remediating you can rescan the hosts to determine the status of your security posture.
Documentation:
Download the Clone Systems Vulnerability Assessment Datasheet (PDF).