Battling the war on vulnerabilities is a daunting and challenging task given the incredible number of new threats every day. As a pioneer in the vulnerability scanning industry, SOFTKEY can present a complete and accurate picture of the security posture of your infrastructure—delivered to meet the requirements of your entire staff including executives, compliance auditors, network/system administrators and security engineers.
Vulnerability assessment is the process of identifying how vulnerable an infrastructure is to known vulnerabilities—the number one threat to all networks today. The threats/risks found in the vulnerability assessment are ranked and prioritized to expose the current security posture, and to facilitate the remediation process. The first assessment is a baseline snapshot illustrating current threats. The second and subsequent assessments are known as periodic or differential scans, and illustrate trending analysis that answers the question—is our security posture improving over time?
It is important to understand that vulnerabilities exist across most systems and devices throughout the network. Typical assessments include targets that consist of network devices, operating systems, desktop applications, databases, Web applications, printers and almost any device that is attached to the network. Many organizations have specific assessment requirements. SOFTKEY engineers work with customers to help define requirements and goals to ensure that the scope of work/deliverables exceeds expectations.