External Vulnerability Assessment
Test the security of your Internet-facing systems.
Our team of Jumbo Systems -certified testers examines your Internet-facing servers for security flaws. Testing begins with automated service enumeration and software fingerprinting. Next, Jumbo Systems uses automated vulnerability assessment tools to identify known vulnerabilities in your servers. Our professional vulnerability scanning tools are always kept up-to-date and check for tens of thousands of known vulnerabilities.
Subsequently, Jumbo Systems’s experienced and creative consultants manually examine your systems for security issues, logic flaws, authentication bypass issues, and other vulnerabilities. In this manner, we identify issues that automated scanners do not detect—but hackers can.
Many vulnerability scanners produce “false positives” due to incorrect service banners or other errors. Jumbo Systems manually checks high-risk issues to reproduce the vulnerability whenever possible and weed out false positives.
Finally, our consultants evaluate the results of automated scanners and manual assessment and provide you with an analysis of the root causes. This provides you with the greatest value from your investment.
A unique approach
Our External vulnerability assessment services are designed to assess your network security from the inside.
Most operating systems, applications, and network devices provide a reasonable level of security, but these security capabilities are typically not activated when the systems are installed. Therefore, the default installation must be “hardened.” Our information security technicians are knowledgeable in the latest networking and operating systems, and can harden your network for all internal and internet-exposed platforms.
How we can help
We address your security from two standpoints: an external intruder breaching your systems, or a malicious insider attempting to access or damage sensitive information or IT resources.
Our service offers an executive-level summary of your risk profile and detailed recommendations for your network administrators on how to address specific findings. Your network will be secured and hardened from the inside to protect against internal hackers, intruders who gain physical access to network resources, or external hackers who successfully breach your perimeter defenses.