SlideShare a Scribd company logo
1 of 4
Download to read offline
Vulnerability Scanning
 Subscription Services
     Description
Table of Contents
VULNERABILITY SCANNING SUBSCRIPTION SERVICE ............................................... 3	
  
  WHY? ........................................................................................................................ 3	
  
  HOW IT WORKS? ......................................................................................................... 3	
  
  NETWORK VULNERABILITY SCANNING SUBSCRIPTION. ...................................................... 3	
  
  WEB APPLICATION VULNERABILITY SCANNING SUBSCRIPTION. ......................................... 4	
  
  DIFFERENTIAL REPORTS ................................................................................................. 4	
  




             Copyright © 2010 - 2012 Cyber 51 Ltd. All Rights Reserved.
Vulnerability Scanning Subscription Services

Why?

Today’s business network infrastructure is rapidly changing with new
servers, services, ports and connections on a continual and sometimes
daily frequency. With the growing number of vulnerabilities and exploits
associated with the continual evolution of IT infrastructure,
organizations now require more frequent vulnerability assessments.
These assessments must naturally be performed with the latest of
vulnerability knowledge and expertise. Thus security expenses have
been rising when overall budgets have not.

How it works?




              We perform scannings weekly. Reports are delivered at the
              next business day.




                  The first day of the month, you will receive a full report,
                  including vulnerabilities details, impacts, risks and
                  recommendations.



              In subsequent scannings (weeks 2, 3 and 4), you will receive
              differential reports where you will find details about new
              vulnerabilities detected, which ones were reintroduced and
              what vulnerabilities were solved.




Network Vulnerability Scanning Subscription

Audit your network perimeter for security vulnerabilities with this easy to
use service. This service performs security checks on your network
components including firewalls, routers, servers and any other IP
connected device on your network that face the internet directly.




       Copyright © 2010 - 2012 Cyber 51 Ltd. All Rights Reserved.
Leverage our network vulnerability scanning service to complement
your IT security strategy by:

   •   Addressing network security threats regularly
   •   Receiving accurate vulnerability assessment data
   •   Freeing up resources from discovery, analysis and research to
       focus on resolving or mitigating threats before they can be
       exploited
   •   Obtain meaningful results, including corrective actions
   •   React quickly to security threats with a reduced lead time
   •   Reduce ongoing costs required to maintain the same level of
       network security

Web Application Vulnerability Scanning Subscription.

Extend your security confidence beyond just your network and perform
regular audits on your web server, pages and web applications.

Our Web Application Vulnerability Scanning Service quickly and easily
provides you with a report detailing common security vulnerabilities
such as:

   •   SQL/Code Injection (PHP/ASP/etc..) & Command Execution
   •   Arbitrary file access (download/upload) & Directory Traversal
   •   Remote file listing, inclusion & Cross Site Scripting (XSS)
   •   Source disclosure, Debug Code & Denial of Service attacks
   •   Known Application vulnerabilities (from vendors & other sources)

Differential reports

Every subscription service comes with weekly differential reports,
providing you a simple, fast and accurate analysis of your network
between two points in time.

This reports includes:

   •   An executive summary, giving you a breakdown of your network
       health at a glance
   •   Detailed list of new vulnerabilities identified since the first scan
   •   Detailed listing of remediated vulnerabilities, resolved in the
       newer scan




        Copyright © 2010 - 2012 Cyber 51 Ltd. All Rights Reserved.

More Related Content

What's hot

Getting Started with Azure Security Center
Getting Started with Azure Security CenterGetting Started with Azure Security Center
Getting Started with Azure Security CenterCheah Eng Soon
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationQualys
 
Global Azure Bootcamp 2018 - Azure Security Center
Global Azure Bootcamp 2018 - Azure Security CenterGlobal Azure Bootcamp 2018 - Azure Security Center
Global Azure Bootcamp 2018 - Azure Security CenterScott Hoag
 
Azure Penetration Testing
Azure Penetration TestingAzure Penetration Testing
Azure Penetration TestingCheah Eng Soon
 
AWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceAWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceYury Chemerkin
 
Azure Security Fundamentals
Azure Security FundamentalsAzure Security Fundamentals
Azure Security FundamentalsLorenzo Barbieri
 
20 common security vulnerabilities and misconfiguration in Azure
20 common security vulnerabilities and misconfiguration in Azure20 common security vulnerabilities and misconfiguration in Azure
20 common security vulnerabilities and misconfiguration in AzureCheah Eng Soon
 
#ALSummit: Cyber Resiliency: Surviving the Breach
#ALSummit: Cyber Resiliency: Surviving the Breach#ALSummit: Cyber Resiliency: Surviving the Breach
#ALSummit: Cyber Resiliency: Surviving the BreachAlert Logic
 
Kaseya Connect 2012 - Kaseya Security Solutions Update
Kaseya Connect 2012 - Kaseya Security Solutions UpdateKaseya Connect 2012 - Kaseya Security Solutions Update
Kaseya Connect 2012 - Kaseya Security Solutions UpdateKaseya
 
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5AlienVault
 
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...Qualys
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceQualys
 
Configuring Data Sources in AlienVault
Configuring Data Sources in AlienVaultConfiguring Data Sources in AlienVault
Configuring Data Sources in AlienVaultAlienVault
 
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Qualys
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to HeroKasun Rajapakse
 
CentOS Implementation - Who Will Support you?
CentOS Implementation - Who Will Support you?CentOS Implementation - Who Will Support you?
CentOS Implementation - Who Will Support you?Sébastien Grimonet
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureQualys
 

What's hot (20)

Getting Started with Azure Security Center
Getting Started with Azure Security CenterGetting Started with Azure Security Center
Getting Started with Azure Security Center
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediation
 
Global Azure Bootcamp 2018 - Azure Security Center
Global Azure Bootcamp 2018 - Azure Security CenterGlobal Azure Bootcamp 2018 - Azure Security Center
Global Azure Bootcamp 2018 - Azure Security Center
 
Azure Penetration Testing
Azure Penetration TestingAzure Penetration Testing
Azure Penetration Testing
 
AWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceAWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the Compliance
 
Azure Security Fundamentals
Azure Security FundamentalsAzure Security Fundamentals
Azure Security Fundamentals
 
20 common security vulnerabilities and misconfiguration in Azure
20 common security vulnerabilities and misconfiguration in Azure20 common security vulnerabilities and misconfiguration in Azure
20 common security vulnerabilities and misconfiguration in Azure
 
#ALSummit: Cyber Resiliency: Surviving the Breach
#ALSummit: Cyber Resiliency: Surviving the Breach#ALSummit: Cyber Resiliency: Surviving the Breach
#ALSummit: Cyber Resiliency: Surviving the Breach
 
Kaseya Connect 2012 - Kaseya Security Solutions Update
Kaseya Connect 2012 - Kaseya Security Solutions UpdateKaseya Connect 2012 - Kaseya Security Solutions Update
Kaseya Connect 2012 - Kaseya Security Solutions Update
 
Ace
AceAce
Ace
 
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5
 
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
 
Swascan
Swascan Swascan
Swascan
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
 
Configuring Data Sources in AlienVault
Configuring Data Sources in AlienVaultConfiguring Data Sources in AlienVault
Configuring Data Sources in AlienVault
 
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to Hero
 
CentOS Implementation - Who Will Support you?
CentOS Implementation - Who Will Support you?CentOS Implementation - Who Will Support you?
CentOS Implementation - Who Will Support you?
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud Infrastructure
 
CRAFT Brochure
CRAFT BrochureCRAFT Brochure
CRAFT Brochure
 

Viewers also liked

Domingo xxxii do tempo comum
Domingo xxxii do tempo comumDomingo xxxii do tempo comum
Domingo xxxii do tempo comumJMVSobreiro
 
Ayodele post 2015 national consultations in africa(4)final
Ayodele post 2015 national consultations in africa(4)finalAyodele post 2015 national consultations in africa(4)final
Ayodele post 2015 national consultations in africa(4)finalDieter Gijsbrechts
 
NP - Stratesys escala posiciones en el Ranking TIC 2014 ComputerWorld
NP - Stratesys escala posiciones en el Ranking TIC 2014 ComputerWorldNP - Stratesys escala posiciones en el Ranking TIC 2014 ComputerWorld
NP - Stratesys escala posiciones en el Ranking TIC 2014 ComputerWorldStratesys
 
Franklin Town Government
Franklin Town GovernmentFranklin Town Government
Franklin Town Governmentleightoj
 
Rio de Janeiro Dialogue
Rio de Janeiro DialogueRio de Janeiro Dialogue
Rio de Janeiro Dialoguegilesfallan
 
ex. 3.9 - ex. 3.14
ex. 3.9 - ex. 3.14ex. 3.9 - ex. 3.14
ex. 3.9 - ex. 3.14GM3D
 
Kurtuluş baymak kombi servisi 294 16 03
Kurtuluş baymak kombi servisi 294 16 03Kurtuluş baymak kombi servisi 294 16 03
Kurtuluş baymak kombi servisi 294 16 03cüneyt çakır
 
Kurs: Wissenschaftliches Schreiben mit LaTeX (Teil 2 von 2)
Kurs: Wissenschaftliches Schreiben mit LaTeX (Teil 2 von 2)Kurs: Wissenschaftliches Schreiben mit LaTeX (Teil 2 von 2)
Kurs: Wissenschaftliches Schreiben mit LaTeX (Teil 2 von 2)Svenja S.
 
Curso cei 301 access nivel medio (variante)
Curso cei 301   access nivel medio (variante)Curso cei 301   access nivel medio (variante)
Curso cei 301 access nivel medio (variante)Procasecapacita
 
Frases y logos que circularon en facebook en mayo12
Frases y logos que circularon en facebook en mayo12Frases y logos que circularon en facebook en mayo12
Frases y logos que circularon en facebook en mayo12Alba Jimenez
 
UVYP Learning Linkedin- the basics and beyond
UVYP Learning Linkedin- the basics and beyondUVYP Learning Linkedin- the basics and beyond
UVYP Learning Linkedin- the basics and beyondLiz Swan
 
Azelia Banks Se Desnuda Para La Revista Playboy
Azelia Banks Se Desnuda Para La Revista PlayboyAzelia Banks Se Desnuda Para La Revista Playboy
Azelia Banks Se Desnuda Para La Revista Playboybumpyworker6875
 

Viewers also liked (20)

Domingo xxxii do tempo comum
Domingo xxxii do tempo comumDomingo xxxii do tempo comum
Domingo xxxii do tempo comum
 
Ayodele post 2015 national consultations in africa(4)final
Ayodele post 2015 national consultations in africa(4)finalAyodele post 2015 national consultations in africa(4)final
Ayodele post 2015 national consultations in africa(4)final
 
NP - Stratesys escala posiciones en el Ranking TIC 2014 ComputerWorld
NP - Stratesys escala posiciones en el Ranking TIC 2014 ComputerWorldNP - Stratesys escala posiciones en el Ranking TIC 2014 ComputerWorld
NP - Stratesys escala posiciones en el Ranking TIC 2014 ComputerWorld
 
nPrimeras planas 29082014
nPrimeras planas 29082014nPrimeras planas 29082014
nPrimeras planas 29082014
 
iWeb Quick Glance Cheat Sheet
iWeb Quick Glance Cheat SheetiWeb Quick Glance Cheat Sheet
iWeb Quick Glance Cheat Sheet
 
Riserva golf barra da tijuca (21) 3149-3200
Riserva golf barra da tijuca   (21) 3149-3200Riserva golf barra da tijuca   (21) 3149-3200
Riserva golf barra da tijuca (21) 3149-3200
 
Franklin Town Government
Franklin Town GovernmentFranklin Town Government
Franklin Town Government
 
Rio de Janeiro Dialogue
Rio de Janeiro DialogueRio de Janeiro Dialogue
Rio de Janeiro Dialogue
 
Vultos da história e da cultura
Vultos da história e da culturaVultos da história e da cultura
Vultos da história e da cultura
 
evolve wealth
evolve wealthevolve wealth
evolve wealth
 
ex. 3.9 - ex. 3.14
ex. 3.9 - ex. 3.14ex. 3.9 - ex. 3.14
ex. 3.9 - ex. 3.14
 
KURT SPORT- REHABILITATION (DE)
KURT SPORT- REHABILITATION (DE)KURT SPORT- REHABILITATION (DE)
KURT SPORT- REHABILITATION (DE)
 
Business bay
Business bayBusiness bay
Business bay
 
Kurtuluş baymak kombi servisi 294 16 03
Kurtuluş baymak kombi servisi 294 16 03Kurtuluş baymak kombi servisi 294 16 03
Kurtuluş baymak kombi servisi 294 16 03
 
Kurs: Wissenschaftliches Schreiben mit LaTeX (Teil 2 von 2)
Kurs: Wissenschaftliches Schreiben mit LaTeX (Teil 2 von 2)Kurs: Wissenschaftliches Schreiben mit LaTeX (Teil 2 von 2)
Kurs: Wissenschaftliches Schreiben mit LaTeX (Teil 2 von 2)
 
Winners Dont Quit
Winners Dont QuitWinners Dont Quit
Winners Dont Quit
 
Curso cei 301 access nivel medio (variante)
Curso cei 301   access nivel medio (variante)Curso cei 301   access nivel medio (variante)
Curso cei 301 access nivel medio (variante)
 
Frases y logos que circularon en facebook en mayo12
Frases y logos que circularon en facebook en mayo12Frases y logos que circularon en facebook en mayo12
Frases y logos que circularon en facebook en mayo12
 
UVYP Learning Linkedin- the basics and beyond
UVYP Learning Linkedin- the basics and beyondUVYP Learning Linkedin- the basics and beyond
UVYP Learning Linkedin- the basics and beyond
 
Azelia Banks Se Desnuda Para La Revista Playboy
Azelia Banks Se Desnuda Para La Revista PlayboyAzelia Banks Se Desnuda Para La Revista Playboy
Azelia Banks Se Desnuda Para La Revista Playboy
 

Similar to Vulnerability Assesment Subscriptions Cyber51

Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51martinvoelk
 
ENGS4851_Final_Certified_Report
ENGS4851_Final_Certified_ReportENGS4851_Final_Certified_Report
ENGS4851_Final_Certified_ReportNagendra Posani
 
Acunetix Training and ScanAssist
Acunetix Training and ScanAssistAcunetix Training and ScanAssist
Acunetix Training and ScanAssistBryan Ferrario
 
In this assignment, you will propose a quality improvement initiat.docx
In this assignment, you will propose a quality improvement initiat.docxIn this assignment, you will propose a quality improvement initiat.docx
In this assignment, you will propose a quality improvement initiat.docxpauline234567
 
Using Analyzers to Resolve Security Problems
Using Analyzers to Resolve Security ProblemsUsing Analyzers to Resolve Security Problems
Using Analyzers to Resolve Security Problemskiansahafi
 
Brochure Swascan Overview
Brochure Swascan OverviewBrochure Swascan Overview
Brochure Swascan OverviewSara Colnago
 
Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIJERA Editor
 
Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01Richard Sullivan
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Kim Jensen
 
Packet capture and network traffic analysis
Packet capture and network traffic analysisPacket capture and network traffic analysis
Packet capture and network traffic analysisCARMEN ALCIVAR
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityGeevarghese Titus
 
Information technology and information security services
Information technology and information security servicesInformation technology and information security services
Information technology and information security servicesDejan Majkic
 
SplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT BreakoutSplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT BreakoutSplunk
 
Mris network architecture proposal r1
Mris network architecture proposal r1Mris network architecture proposal r1
Mris network architecture proposal r1Craig Burma
 
Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]LinkedIn
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management SystemIRJET Journal
 

Similar to Vulnerability Assesment Subscriptions Cyber51 (20)

Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51
 
ENGS4851_Final_Certified_Report
ENGS4851_Final_Certified_ReportENGS4851_Final_Certified_Report
ENGS4851_Final_Certified_Report
 
Acunetix Training and ScanAssist
Acunetix Training and ScanAssistAcunetix Training and ScanAssist
Acunetix Training and ScanAssist
 
In this assignment, you will propose a quality improvement initiat.docx
In this assignment, you will propose a quality improvement initiat.docxIn this assignment, you will propose a quality improvement initiat.docx
In this assignment, you will propose a quality improvement initiat.docx
 
Using Analyzers to Resolve Security Problems
Using Analyzers to Resolve Security ProblemsUsing Analyzers to Resolve Security Problems
Using Analyzers to Resolve Security Problems
 
Brochure Swascan Overview
Brochure Swascan OverviewBrochure Swascan Overview
Brochure Swascan Overview
 
IKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet ENIKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet EN
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation Criteria
 
Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report
 
Packet capture and network traffic analysis
Packet capture and network traffic analysisPacket capture and network traffic analysis
Packet capture and network traffic analysis
 
Sba web sec_dg
Sba web sec_dgSba web sec_dg
Sba web sec_dg
 
Security testing
Security testingSecurity testing
Security testing
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Information technology and information security services
Information technology and information security servicesInformation technology and information security services
Information technology and information security services
 
SplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT BreakoutSplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT Breakout
 
Mris network architecture proposal r1
Mris network architecture proposal r1Mris network architecture proposal r1
Mris network architecture proposal r1
 
Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management System
 

More from martinvoelk

Cyber51 Company Presentation Public
Cyber51 Company Presentation PublicCyber51 Company Presentation Public
Cyber51 Company Presentation Publicmartinvoelk
 
Consulting Flyer
Consulting FlyerConsulting Flyer
Consulting Flyermartinvoelk
 
Penetration Testing Services Technical Description Cyber51
Penetration Testing Services Technical Description Cyber51Penetration Testing Services Technical Description Cyber51
Penetration Testing Services Technical Description Cyber51martinvoelk
 
VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51martinvoelk
 
Web Application Penetration Test
Web Application Penetration TestWeb Application Penetration Test
Web Application Penetration Testmartinvoelk
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51martinvoelk
 
Ppctrainer Offers
Ppctrainer OffersPpctrainer Offers
Ppctrainer Offersmartinvoelk
 
AdWords Training & AdWords Consulting
AdWords Training & AdWords ConsultingAdWords Training & AdWords Consulting
AdWords Training & AdWords Consultingmartinvoelk
 
AdWords Training & AdWords Consulting
AdWords Training & AdWords ConsultingAdWords Training & AdWords Consulting
AdWords Training & AdWords Consultingmartinvoelk
 
Basic Adwords Course Outline
Basic Adwords Course OutlineBasic Adwords Course Outline
Basic Adwords Course Outlinemartinvoelk
 
Pronetexpert Cisco Ccde Bootcamp Training Courses
Pronetexpert Cisco Ccde Bootcamp Training CoursesPronetexpert Cisco Ccde Bootcamp Training Courses
Pronetexpert Cisco Ccde Bootcamp Training Coursesmartinvoelk
 
CCIE Bootcamp Training Courses
CCIE Bootcamp Training CoursesCCIE Bootcamp Training Courses
CCIE Bootcamp Training Coursesmartinvoelk
 
Servicios de la Seguridad delos Redes
Servicios de la Seguridad delos RedesServicios de la Seguridad delos Redes
Servicios de la Seguridad delos Redesmartinvoelk
 
IT Network Security Services
IT Network Security ServicesIT Network Security Services
IT Network Security Servicesmartinvoelk
 
ProNetExpert Cisco Premier Partner & Cisco Learning Partner Associate
ProNetExpert Cisco Premier Partner & Cisco Learning Partner AssociateProNetExpert Cisco Premier Partner & Cisco Learning Partner Associate
ProNetExpert Cisco Premier Partner & Cisco Learning Partner Associatemartinvoelk
 

More from martinvoelk (15)

Cyber51 Company Presentation Public
Cyber51 Company Presentation PublicCyber51 Company Presentation Public
Cyber51 Company Presentation Public
 
Consulting Flyer
Consulting FlyerConsulting Flyer
Consulting Flyer
 
Penetration Testing Services Technical Description Cyber51
Penetration Testing Services Technical Description Cyber51Penetration Testing Services Technical Description Cyber51
Penetration Testing Services Technical Description Cyber51
 
VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51
 
Web Application Penetration Test
Web Application Penetration TestWeb Application Penetration Test
Web Application Penetration Test
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
 
Ppctrainer Offers
Ppctrainer OffersPpctrainer Offers
Ppctrainer Offers
 
AdWords Training & AdWords Consulting
AdWords Training & AdWords ConsultingAdWords Training & AdWords Consulting
AdWords Training & AdWords Consulting
 
AdWords Training & AdWords Consulting
AdWords Training & AdWords ConsultingAdWords Training & AdWords Consulting
AdWords Training & AdWords Consulting
 
Basic Adwords Course Outline
Basic Adwords Course OutlineBasic Adwords Course Outline
Basic Adwords Course Outline
 
Pronetexpert Cisco Ccde Bootcamp Training Courses
Pronetexpert Cisco Ccde Bootcamp Training CoursesPronetexpert Cisco Ccde Bootcamp Training Courses
Pronetexpert Cisco Ccde Bootcamp Training Courses
 
CCIE Bootcamp Training Courses
CCIE Bootcamp Training CoursesCCIE Bootcamp Training Courses
CCIE Bootcamp Training Courses
 
Servicios de la Seguridad delos Redes
Servicios de la Seguridad delos RedesServicios de la Seguridad delos Redes
Servicios de la Seguridad delos Redes
 
IT Network Security Services
IT Network Security ServicesIT Network Security Services
IT Network Security Services
 
ProNetExpert Cisco Premier Partner & Cisco Learning Partner Associate
ProNetExpert Cisco Premier Partner & Cisco Learning Partner AssociateProNetExpert Cisco Premier Partner & Cisco Learning Partner Associate
ProNetExpert Cisco Premier Partner & Cisco Learning Partner Associate
 

Vulnerability Assesment Subscriptions Cyber51

  • 1. Vulnerability Scanning Subscription Services Description
  • 2. Table of Contents VULNERABILITY SCANNING SUBSCRIPTION SERVICE ............................................... 3   WHY? ........................................................................................................................ 3   HOW IT WORKS? ......................................................................................................... 3   NETWORK VULNERABILITY SCANNING SUBSCRIPTION. ...................................................... 3   WEB APPLICATION VULNERABILITY SCANNING SUBSCRIPTION. ......................................... 4   DIFFERENTIAL REPORTS ................................................................................................. 4   Copyright © 2010 - 2012 Cyber 51 Ltd. All Rights Reserved.
  • 3. Vulnerability Scanning Subscription Services Why? Today’s business network infrastructure is rapidly changing with new servers, services, ports and connections on a continual and sometimes daily frequency. With the growing number of vulnerabilities and exploits associated with the continual evolution of IT infrastructure, organizations now require more frequent vulnerability assessments. These assessments must naturally be performed with the latest of vulnerability knowledge and expertise. Thus security expenses have been rising when overall budgets have not. How it works? We perform scannings weekly. Reports are delivered at the next business day. The first day of the month, you will receive a full report, including vulnerabilities details, impacts, risks and recommendations. In subsequent scannings (weeks 2, 3 and 4), you will receive differential reports where you will find details about new vulnerabilities detected, which ones were reintroduced and what vulnerabilities were solved. Network Vulnerability Scanning Subscription Audit your network perimeter for security vulnerabilities with this easy to use service. This service performs security checks on your network components including firewalls, routers, servers and any other IP connected device on your network that face the internet directly. Copyright © 2010 - 2012 Cyber 51 Ltd. All Rights Reserved.
  • 4. Leverage our network vulnerability scanning service to complement your IT security strategy by: • Addressing network security threats regularly • Receiving accurate vulnerability assessment data • Freeing up resources from discovery, analysis and research to focus on resolving or mitigating threats before they can be exploited • Obtain meaningful results, including corrective actions • React quickly to security threats with a reduced lead time • Reduce ongoing costs required to maintain the same level of network security Web Application Vulnerability Scanning Subscription. Extend your security confidence beyond just your network and perform regular audits on your web server, pages and web applications. Our Web Application Vulnerability Scanning Service quickly and easily provides you with a report detailing common security vulnerabilities such as: • SQL/Code Injection (PHP/ASP/etc..) & Command Execution • Arbitrary file access (download/upload) & Directory Traversal • Remote file listing, inclusion & Cross Site Scripting (XSS) • Source disclosure, Debug Code & Denial of Service attacks • Known Application vulnerabilities (from vendors & other sources) Differential reports Every subscription service comes with weekly differential reports, providing you a simple, fast and accurate analysis of your network between two points in time. This reports includes: • An executive summary, giving you a breakdown of your network health at a glance • Detailed list of new vulnerabilities identified since the first scan • Detailed listing of remediated vulnerabilities, resolved in the newer scan Copyright © 2010 - 2012 Cyber 51 Ltd. All Rights Reserved.