Vulnerability Management

Vulnerability assessment is the process of identifying how vulnerable an infrastructure is to known vulnerabilities—the number one threat to all networks today. The threats/risks found in the vulnerability assessment are ranked and prioritized to expose the current security posture, and to facilitate the remediation process. The first assessment is a baseline snapshot illustrating current threats. The second and subsequent assessments are known as periodic or differential scans, and illustrate trending analysis that answers the question—is our security posture improving over time? It is important to understand that vulnerabilities exist across most systems and devices throughout the network. Typical assessments include targets that consist of network devices, operating systems, desktop applications, databases, Web applications, printers and almost any device that is attached to the network. Many organizations have specific assessment requirements. Our experts work with client to help define requirements and goals to ensure that the scope of work/deliverables exceeds expectations.

Intelipath’s Services Include:
  • External network vulnerability assessments and penetration testing
  • Internal network vulnerability assessments
  • Network architecture reviews
  • Device configuration reviews (covering both host and network devices)
  • Wireless security assessments
  • VoIP security assessments
  • Active directory reviews
  • Social engineering and physical penetration test
  • Insider threat assessments
  • Custom services as requested

From a strategic standpoint, vulnerability scanning should be integrated into an overall vulnerability management program and bundled with periodic penetration testing exercises to provide a realistic view of the impact that technical vulnerabilities can have on your environment. Engaging in ongoing vulnerability scans provides insight, intelligence, and metrics that help you achieve incremental improvement over time. Creating a benchmark and measuring these areas of the program on a repeating basis, reduces risk and increases the overall security posture for the organization.

Approach

For each project, we employ a multi-step process that includes reconnaissance, scanning, identifying false positives and interpreting the results. At the onset, InteliPath consultants work with you to validate security testing goals and ensure that the findings align with them. Because requirements can vary by organization, our consultants work to understand both the strategic and tactical objectives of your project. This approach ensures that areas tested as well as the methodology employed, will produce results that align with the overall testing goals. Results Network vulnerability assessments are an integral part of continuous monitoring and provide ongoing feedback for your program by accomplishing the following:

  • Validate patching activities
  • Enumerate real and exploitable risks
  • Configuration baseline and standards testing
  • Identify rogue or unauthorized assets
  • Validate change control
  • Provide meaningful metrics