Call a Specialist Today! 833-335-0427

Vulnerability Assessment
 

Vulnerability Assessment

Clone Systems Products
Solutions
Security Scanning
#Security-Scanning
Get a Quote!

Proactively assess your network to identify and prioritize your network security threats

assess network

Minimize the risk of a security breach by providing insights and guidance to properly secure your network

minimize risk

Obtain executive level and detailed technical reporting for the vulnerabilities that exist in your infrastructure

technical reporting

How Vulnerability Assessment Works

External Vulnerability Scanning

External vulnerability scans are scheduled through the Clone Systems Vulnerability Assessment portal. When the scans are executed our scanning infrastructure assesses the hosts identified in the scan criteria against our threat intelligence and signatures in order to identify any existing threats, vulnerabilities or weaknesses. The results are then recorded in our solution and available via the Clone Systems Vulnerability Assessment portal so that you can review remediation steps and take any necessary actions. Upon remediating you can rescan the hosts to determine the status of your security posture.

External vulnerabilities

Internal Vulnerability Scanning

Internal vulnerability scans require you to configure a Clone Systems scanning server within your network. The scanning server can either be a physical server or a virtual server and we support the majority of virtual environments (VMware, VirtualBox, Microsoft Hyper-V, and Citrix XEN to name a few). Upon configuring the internal scanning server and confirming secure connectivity back to the Clone Systems SOC you can schedule the vulnerability scan through the Clone Systems Vulnerability Assessment portal. When the scans are executed our solution communicates directly with the scanning server within your network to assesses the hosts identified in the scan criteria against our threat intelligence and signatures in order to identify any existing threats, vulnerabilities or weaknesses. The results are then recorded in our solution and available via the Clone Systems Vulnerability Assessment portal so that you can review remediation steps and take any necessary actions. Upon remediating you can rescan the hosts to determine the status of your security posture.

Documentation:

Download the Clone Systems Vulnerability Assessment Datasheet (PDF).