Vulnerability Scans

Vulnerability Assessments

We offer full vulnerability assessment services for internal or external networks.

Vulnerability assessments are similar to penetration tests, but are automated and aim to give you a high-level view of risks over a much larger area of your network, in a shorter amount of time.

vulnerability-assessments

Vulnerability assessments look for known vulnerabilities and report back potential exposures.  It is normally an automated scan using a commercial tool.  It is different to a penetration test where a human tester uses a variety of different methods to try to exploit and verify any weaknesses.  

Vulnerability tests can sometimes produce what is known as "false positives" where the software assumes certain issues or vulnerabilities based on criteria, but these may be incorrect. However these can be very useful for preparation before penetration testing, or to sweep larger network areas on a more regular basis.

We can offer the following automated services:

  • Unauthenticated external vulnerability assessments
  • Internal unauthenticated and authenticated vulnerability assessments
  • Workstation and server patch checking sweeps

Armadillo Sec are a CREST certified testing body and we are accredited to operate as a CHECK service provider. All of our testers are certified by CREST and our senior consultants are certified by CREST to the highest CCT Level. Our testers are also CHECK Team Leaders (CTL’s) or CHECK Team Members (CTM’s) and are approved to conduct government CHECK testing.

Our team have many years experience conducting a broad range of government and commercial tests and always aim to go the extra mile for our customers.

Vulnerability Assessments | Vulnerability Testing
Accredited Company
Certified Testers
Security Cleared Staff
No Cancellation Fees
Report Walk Through

Frequently Asked Questions

Unauthenticated Testing

This tests the hosts in scope for any identified vulnerabilities in software versions or configuration issues on exposed services. It does not login to the system, therefore does not run more detailed checks that would only be possible when using local administrative user credentials. 

Authenticated Testing

This tests the hosts in scope for any identified vulnerabilities in software versions or configuration issues, by logging into the host as an administrative user. This performs a much more detailed review and covers patch checking and configuration issues for the unexposed services on the host. If you wished to check all patching levels of systems across your network, an authenticated test would be the best option.

All our testers are certified by CREST and our senior consultants are certified by CREST to the highest CCT level.

CREST CertificationsCertified Testers
Practitioner Security AnalystsYes
Registered Penetration TestersYes
Certified Web Application TestersYes
Certified Infrastructure TestersYes

crest approved

Our CREST member status can be viewed, along with the certified tester types we have on the below link:

http://www.crest-approved.org/membercompanies/armadillo-sec-ltd


Our testers are also CHECK Team Leaders (CTL's)  or CHECK Team Members (CTM's) and are approved to conduct government CHECK testing.

CHECK StatusCertified Testers
CHECK Team Member (CTM)Yes
CHECK Team Leader (CTL) - InfrastructureYes
CHECK Team Leader (CTL) - ApplicationsYes

Our CHECK status can be viewed on the below link: 

https://www.ncsc.gov.uk/professional-service/armadillo-sec-ltd-check-service

It is recommended that external and internal vulnerability assessments or penetration testing should be conducted annually as cyber threats are constantly evolving.

If major changes are made to the infrastructure or new applications are developed, then it is recommended that additional testing is conducted. This ensures that any recent changes are not introducing new vulnerabilities into the environment.

Some certifications such as ISO 27001 or PCI DSS, require a certain frequency of testing to remain compliant.

Vulnerability assessment testing prices are calculated on the number of hosts/systems required to be scanned and if the systems are externally facing to the Internet and/or if internal to your network, therefore there is not an off-the-shelf price for a vulnerability assessment.

For each project we will technically scope your requirements and establish the time needed to complete the work. We will then provide a detailed proposal and breakdown of costs and options.

We supply a full vulnerability assessment report, which covers the following:

  • Executive management summary - Non technical overview of issues for management board level
  • Detailed technical findings - A complete list of all issues identified
  • Affected hosts - A list of all hosts affected, including the associated network port
  • Risk level - Impact, likelihood and overall risk ratings are listed for each issue
  • Examples - Output or screenshots to demonstrate the issue
  • Recommendations - Recommendations of how to remediate the issues, including any reference to documents that can assist

A sample report can be supplied upon request.

We have a full methodology for all testing services we provide, which is supplied with each project proposal. This outlines the testing steps and all the requirements in order to deliver the test.

We offer the full range of cyber security testing services

Ready to discuss your project?

misson banner scs
Vulnerability Assessments | Vulnerability Testing