Signed in as:
filler@godaddy.com
Signed in as:
filler@godaddy.com
This is our basic package , designed with the intent to provide an external perspective of what vulnerabilities can be exploited by threat actors fully external to your environment.
This service offering capability can account for vulnerability scans up to 65 systems/devices within an environment.
This package offering includes vulnerability scanning from an external perspective to provide you with information that can be accessed about your organization from a device that is outside to your organization.
Reporting that is provided in this package offering includes Bi-Weekly reports on the vulnerabilities and information collected on your organization's environment and metric reporting on how effective our scanning coverage is.
This package give you detailed insight into your organizations attack surface, including all hardware and software that your organization uses. This is best for organizations that are interested in continually assessing their environment on the ability to maintain and update their IT infrastructure.
This service offering capability can account for vulnerability scans up to 65-150 systems/devices within an environment.
This package offering includes vulnerability scanning from an internal perspective to provide you with information pertaining to the specific hardware/software vulnerabilities that are applicable to your environment. This type of vulnerability assessment is tailored to your organization.
Reporting that is provided in this package offering includes Bi-Weekly reports on the finding information collected on your organization's environment and metric reporting on how effective our scanning coverage
This is our full Vulnerability Management service offering that gives a comprehensive and detailed look into the attack surface that your organization holds, providing and tracking prioritized remediation plans. This package is designed to provide your organization with the tools and information to build out your vulnerability and compliance management program.
This service offering capability can account for vulnerability scans up to 65-225 systems/devices within an environment.
This package offering includes vulnerability scanning from internal and perspective to provide you with information pertaining to the specific hardware/software vulnerabilities that are applicable to your environment. This type of vulnerability assessment is tailored to your organization and is best suited to develop an optimized remediation plan for your organization. We also include Website Application Scanning of your organization's public facing website applications and report any finding
In our Titanium Package, we provide the capability to not only scan systems within your environment for secure configurations, but also the ability to scan systems in your environment for their compliance with your established configuration guidelines.
Reporting that is provided in this package offering includes Bi-Weekly reports on the finding information collected on your organization's environment, metric reporting on how effective our scanning coverage , and an Optimized Remediation Plan tailored to your organizations vulnerabilities. The Remediation Plan is tracked to completion with a designated timeline and milestones that must be met to complete the remediation.
Each of the above packages can be purchased as is or tailored to fit your business needs. All rates can be negotiated once we have completed the introductory meeting and have designed your tailored service offering.