Vulnerability Scanning
Vulnerability scanning is something all businesses need to be doing on their servers if they want them to actually be secure enough to keep hackers out. This vulnerability scanning service runs some automated checks on your system or systems to see what potential threats are lurking around. It runs everything from basic stuff like running services that aren’t necessary anymore, all the way up to seeing how bad it is if someone manages to get into your network by checking for other vulnerabilities.
Vulnerabiltiy Scanning can be performed One-Off or
Continuously based on your needs
Solo
Our Solo vulnerability scanning option is a one-off service that is built around your needs and requirements. We’ll use a range of tools and automated scans to check your required networks for vulnerabilities.
This data will then be uploaded to your personal SecurePortal account where you will be given a full breakdown of the findings, ratings of each vulnerability found and personalised remediation advice from one of our experienced consultants.
Continuum
The continuum package offers around the clock vulnerability scanning. In the modern-day one-off scans aren’t always enough, with new exploits and misconfiguration being unearthed on a day-to-day basis.
That’s why Pentest People have created a retainer-based service that actively scans all your networks and applications on a day by day basis. Alerting you to any high or critical vulnerabilities found through your own personal SecurePortal with continuous support and remediation advice.

What Are The Risks?
There are two big reasons that Vulnerability Scanning is important. One, it lets you know if your system has any vulnerabilities that can be exploited by hackers to gain access to your network. Two, it gives you a good idea of how bad this attack could be so you have some kind of estimate on what might happen in the worst-case scenario.
Vulnerabilities are one of those things that shouldn’t exist when it comes to security but because computers/networks are complicated pieces of machinery, they will never be completely free from issues or cyber-attacks. Hackers look for anything and everything they can exploit when trying to breach a system’s defences. Some examples include weak passwords, open ports in firewalls, malware installed without permission, software with outdated components which have public vulnerability reports, bugs in the operating system and more.

How Can Our Vulnerability Scanning Service Help?
Pentest People offer vulnerability scanning that is a full vulnerability assessment of your on-premise or cloud IT environment.
This Vulnerability Scanning, as a service, will scan over vulnerabilities existing in the software and hardware on which your company runs its operations. It will include security holes such as improper access control, security misconfiguration, insecure interfaces and functions, cross-site scripting (XSS), SQL injection, remote code execution, incorrect permissions and many more.
Our vulnerability management solution discovers all devices that allow traffic in and out of your network, including IoT devices. It also discovers vulnerabilities in operating systems, both on-premise and public cloud instances.
Pentest People are accredited to CREST and UK NCSC CHECK standards and can provide infrastructure penetration testing against all types of IT infrastructure used within your organisation
The service would be delivered as part of the Pentest People Penetration Testing as a Service (PTaaS) and full access to the SecurePortal and other complementary tools would be provided.
Vulnerability Scanning allows
access to SecurePortal
Digital Report
Until now, the traditional deliverable from a Penetration Testing engagement has been a lengthy 100+ page PDF report.
Pentest People have developed a solution to this issue where you interact with your vulnerabilities within the SecurePortal.
Vulnerability Data
Constantly updating Vulnerability Information to stay in touch with the emerging threat landscape.
Receive overview and trend data of all of the current security issues you face in your organisation. All viewable on an interactive dashboard.
Skilled Consultants
Rest assured that your Infrastructure Testing assessments are performed by qualified Security Consultants.
Our specialised team of security consultants hold industry qualifications such as CHECK Team Member & Team Leader, CCIE, CISSP and CEH.