Internal Security Vulnerability Scanning
Organisation’s internal infrastructures should be regularly scanned against a known set of industry accepted vulnerabilities to ensure the most basic level of technical security is in place both externally and internally.
Warrior provides clients with an on-demand service for internal vulnerability scanning of over 42,000 vulnerabilities (and counting!) against a wealth of different operating systems, services and applications.
Delivered via an on-site appliance, clients can manage the scanning internally, without the need for external input or access. Alternatively, the appliance can be configured to automatically assess target systems on any given date.
These vulnerability checks are constantly updated with daily feeds and monitored by Warrior consultants, who review the findings and alert clients to severe or urgent vulnerabilities requiring attention.
External Security Vulnerability Scanning
In the constantly changing threat landscape, external infrastructure should be regularly scanned to ensure the most basic level of technical security is in place.
Warrior Networks utilises cloud based vulnerability Approved Scan Vendor (ASV) scanning engines to regularly assess externally facing infrastructure. In line with many regulatory compliance requirements,
Warrior Networks recommends an organisation run internal and external network vulnerability scans at least quarterly as well as after any significant change to a network. These scans identify and report on known vulnerabilities that require remediation in order to maintain compliance and protect the external infrastructure from basic attacks.
Our experts manually review each scan report to flag up any failed scans, whilst offering support on the appropriate remediation options available.