banner image

Vulnerability Assessment

Find that weakest link

Vulnerability assessment (VA) is a process of identifying and evaluating potential vulnerabilities, weaknesses, and security holes in a system, network, or application. This process is essential to assess the overall security posture of an organization and identify areas that need to be improved to mitigate the risks associated with potential attacks.

Use Cases:

Scalable assessment

Assess a large number of systems quickly.

Continuous testing

Known vulnerabilities change with time, and continuous assessment can help stay ahead of the game.

Cost-effective

Assess systems in a cost-effective way to maximise your security budget.

VA refers to Vulnerability Assessment. VA is almost entirely automated: it's fast and cost-effective. PT adds the skill of an expert tester who can combine and exploit weaknesses that VA can't see: it's more thorough. Contact us to discuss the best way to combine VA & PT for your systems.

Pragma's Vulnerability Assessment team is certified by CREST, the leading standard for professionalism in security testing, so you can have confidence in the quality of our tests.

When you sign up for a Vulnerability Assessment, you give our team a target and a deadline and we will spend time studying the target and identifying the ways an attacker can break in. We'll give you:

A detailed list of findings, following standard methodologies such as the OWASP Top 10
Clear risk ratings so you know which are the show-stoppers and which fixes can be safely deferred
Detailed advice on how to close each vulnerability
A debrief session for your development team with our CREST-certified Testers to walk through the issues and answer any questions they have: security education is one of the best ways to improve future security.

A free retest once you've fixed the issues so you know you're good to go, and can demonstrate an up-to-date clean report.

Common systems that should be assessed for vulnerabilities:

Web Applications

The number one target for attackers.

Exposed APIs

An emerging focus for attackers, as API breaches can give a larger.

IT infrastructure

Internet of Things (IoT) devices

Often the weakest link in any security chain.

Cloud Tenancies

Infrastructure-as-a-Service (IaaS) platforms have great advantages, but also introduce a new channel of attack.