Addressing the changing attack surface and report on your risk exposure.
All types of organizations are embracing the digital transformation to create new business models and ecosystems, and to deliver new products and services. At the same time organizations are looking at how they can use digital transformation to operate more efficiently and such improve profitability.
While digital transformation opens a whole new world of opportunities, it also introduces a more complex attack surface to defend.
One of the cornerstones in every information security program is vulnerability management. By not knowing the risk exposure it is difficult for organizations to know how and where they should focus their, often limited security resources, to strengthen their defenses.
Our cloud based security service Watchcom Vulnerability Management is developed to address this challenge.
Watchcom Vulnerability Management is a combination of best-of- breed technology and specially trained Vulnerability Analysts. Our vulnerability analysts provide your organization with reporting capabilities and visibility into your organizations risk exposure based on your composition of vulnerabilities. We will scan your infrastructure on a regular basis and report on the findings in a fixed schedule. By using our service over time, you get trending on the composition of vulnerabilities and you can measure if your security initiatives are as effective as you hope they are.
Whether you need Vulnerability Management for compliance reasons, reporting to management or as an external expert opinion, this service provides excellent documentation of your efforts for managing vulnerabilities.
Get our free E-book 10 steps to Achieving Effective Vulnerability Management. Send us an e-mail and we will send the e-book to you.
Perimeter Scanning – Detects and gives you a valuable tool to mitigate vulnerabilities in your systems exposed to the internet
Internal Scanning – Detects and gives you a valuable tool to mitigate vulnerabilities in your internal network. We offer both traditional centralized scanner methodology our agent-based scanners to ft your needs.
Scanning of Cloud Deployments – Specially designed components used to detect and mitigate vulnerabilities in systems in your cloud-based deployments.
Our service levels are designed to fit different levels of maturity and needs for our customers, ranging from Ultimate level, for our most demanding customers to the Standard level, which provides valuable information to guide you in your quest to managing vulnerabilities.
A detailed description of the service level can be found in the System Description.
Our reports are structured based on customer feedback to provide an easy-to-understand overview of your
vulnerabilities and include the following:
Periodic Summary - Our senior analyst team creates a high level easy to read summary commenting high-level the results for the latest month.
Scope Overview - Gives you a clear understanding of which targets that are included in the report.
Top 10 Vulnerabilities - The most critical vulnerabilities listed first. Discovery method and remediation suggestions is included.
Visualization of Trends - Usable to track the changes in the vulnerability count over time.
Overview of Scanned Websites - Gives you a clear understanding of which websites that are included in the report.
Overview of Scanned IP-addresses - Gives you a clear understanding of which IP-addresses that are included in the report.
Reports from our service helps adhere compliance to the following standards:
FFIEC, FISMA, CyberScope, GLBA, HIPAA/HITECH, NERC, PCI, SCAP, SOX
CERT, CIS, COBIT/ITIL, DISA STIGs, FDCC, ISO, NIST, NSA