Vigilant vulnerability assessment

Running a continuous vulnerability assessment programme is fundamental for any organisation. Unfortunately, when it comes to network security many organisations stop at patch management and antivirus. What they fail to realise is that they need to also check their configurations, known issues in third-party applications, as well as potentially compromised hardware that in their default configuration can be harmful to the security of their network.

Snode utilises industry leading technology to perform vulnerability scans and compliance audits. The objectives of a vulnerability assessment is to provide management with a cyclical scanning and assessment of the environment under review.

Vulnerability management objectives
Identify (vulnerability assessment) whether vulnerabilities exist on the critical IP addresses, provided by management, which could be exploited to gain access to the internal network, system and resources.
Assess whether the network is actively being monitored to ensure that the administrator is notified in a timely manner of any security violations.
The vulnerability scanning process
External cyclical vulnerability scanning:

We will obtain a comprehensive list of the external facing IP addresses (these are IP addresses that can be seen by external parties without being on the network). Snode will then assess whether any vulnerabilities exist on these IP’s on a continuous basis.

Internal cyclical vulnerability scanning:
Scanning includes environment analysis, implementation and onboarding of a cyclical vulnerability scanning process to continuously detect vulnerabilities within your environment.
The Snode vulnerability scanning methodology helps us identify vulnerabilities in your environment quickly, closing the gap bad actors could use to exploit your environment.
Platform intelligence amplification

The Guardian platform seamlessly integrates with the vulnerability scan to visualise a complete vulnerability landscape.

These outputs are used to correlate any anomalous behaviour on the platform with any vulnerabilities identified during the scanning process – platform intelligence amplification.

This provides you with an additional level of context and assisting in accurately determining the relevant risk rating and exposure level of a particular event.