Vulnerability AssessmentsIdentify, quantify, and assess potential security threats to each of your network resources before disaster can strike.
Vulnerability Assessments are the best way to create an overall snapshot of your company’s technical security posture. Hermetic Networks begins this process by using both automated and manual methods to identify all your network systems. We calculate the amount of various ports, protocols, and services running on each network system. Then, we evaluate the security configurations for specific components, beginning with:
- Operating Systems
- Web Servers
- Application Servers
- Network Devices
- Wireless Equipment
- COTS Platforms such as SharePoint
From there, Hermetic Networks identifies specific vulnerabilities. We compare each device, or component configuration, against generally accepted security regulations, best practices, vendor recommendations, and specific customer requested standards. We also comb through the data to validate findings and remove false positives. At the end of the assessment, Hermetic Networks will provide a complete report outlining all the information and assets a potential hacker could detect on your network.