Vulnerability assessment (VA) is a process of identifying and evaluating potential vulnerabilities, weaknesses, and security holes in a system, network, or application. This process is essential to assess the overall security posture of an organization and identify areas that need to be improved to mitigate the risks associated with potential attacks.
Use Cases:
Scalable assessment
Assess a large number of systems quickly.
Continuous testing
Known vulnerabilities change with time, and continuous assessment can help stay ahead of the game.
Cost-effective
Assess systems in a cost-effective way to maximise your security budget.
VA refers to Vulnerability Assessment. VA is almost entirely automated: it's fast and cost-effective. PT adds the skill of an expert tester who can combine and exploit weaknesses that VA can't see: it's more thorough. Contact us to discuss the best way to combine VA & PT for your systems.
Pragma's Vulnerability Assessment team is certified by CREST, the leading standard for professionalism in security testing, so you can have confidence in the quality of our tests.
When you sign up for a Vulnerability Assessment, you give our team a target and a deadline and we will spend time studying the target and identifying the ways an attacker can break in. We'll give you:
A free retest once you've fixed the issues so you know you're good to go, and can demonstrate an up-to-date clean report.
Common systems that should be assessed for vulnerabilities:
Web Applications
The number one target for attackers.
Exposed APIs
An emerging focus for attackers, as API breaches can give a larger.
IT infrastructure
Internet of Things (IoT) devices
Often the weakest link in any security chain.
Cloud Tenancies
Infrastructure-as-a-Service (IaaS) platforms have great advantages, but also introduce a new channel of attack.