ATCOM Vulnerability Scanning & Assessment

One Simple Solution for Protecting Your Data

Identify Network Vulnerabilities and Weaknesses Before They Can Be Exploited

ATCOM Vulnerability Scanning and Assessment is a systematic review of security weaknesses within your information system. Our seasoned security specialists test and evaluate if the system is susceptible to any known security vulnerabilities and recommends remediation or mitigation through quarterly reporting.

Why is Vulnerability Scanning Important?

Vulnerabilities can exist on your network for years before they are exploited. Proactively scanning for and identifying vulnerabilities can significantly reduce your security risk profile. Identifying and closing vulnerabilities (such as unpatched areas) can save you time, money, and frustration.

In addition, information from your vulnerability scanning can be used to ensure your organization is aligning with HIPAA, PCI DSS, and NIST CSF requirements.

Testing, Analysis, and Assessment

External Vulnerability Scanning (EVS) assesses your internet-facing infrastructure for known vulnerabilities that an unauthorized attacker could exploit. EVS discovers security holes in your most exposed systems and includes detection of:

  • ATCOM--Favicon-72x72
    Web-Layer Security Issues
  • ATCOM--Favicon-72x72
    Infrastructure Weaknesses
  • ATCOM--Favicon-72x72
    Security Misconfigurations
  • ATCOM--Favicon-72x72
    Threat Exposed Systems

Internal Vulnerability Scanning (IVS) assesses and finds weaknesses on your private network, that is typically hidden behind a firewall and is only accessible by employees or trusted partners. IVS tests and checks for similar types of issues as our external scans, but from a trusted position on the device and includes detection of:

  • ATCOM--Favicon-72x72
    System Configuration Weaknesses
  • ATCOM--Favicon-72x72
    Missing Patches
  • ATCOM--Favicon-72x72
    Insecure versions of software components and framework
  • ATCOM--Favicon-72x72
    Encryption Weaknesses
  • ATCOM--Favicon-72x72
    Exposed PII or ePHI

Cloud Vulnerability Scanning (CVS) assesses your Microsoft Cloud resources and finds known weaknesses that could be exploited within your cloud infrastructure. CVS scans for vulnerabilities and control issues, where applicable, that include:

  • ATCOM--Favicon-72x72
    Unimplemented Microsoft Security Controls
  • ATCOM--Favicon-72x72
    Improperly Configured Email Controls
  • ATCOM--Favicon-72x72
    User and Access Rights Controls
  • ATCOM--Favicon-72x72
    Password Policy Configuration Controls
  • ATCOM--Favicon-72x72
    New Application Discovery Controls

How Often Should Vulnerability Scans be Performed?

By performing regular Vulnerability Assessments, you can gain detailed visibility into your IT network to analyze potential security threats from undetected issues, develop solutions based on the issues detected by the assessment, and protect your IT infrastructure from various external and internal threats before they can be exploited.

Knowing the various detected issues, your IT team can then prioritize remediation, protect your assets and guard against unexpected downtime, while developing a long-term, strategic vulnerability management plan.

Performing an IT vulnerability assessment can not only help you identify hard-to-detect issues and come up with the necessary fixes but can also help you devise an action plan to track the progress of your remediation.