Vulnerability Assessments scan your environment for weaknesses which present risk.
A Vulnerability Assessment includes of a review of systems and publicly available data to discover existing weaknesses that present risk from misconfigurations, unpatched systems, and user behavior. Think of a Vulnerability Assessment as an external inspection of potential issues without actually trying to get past your defenses.
Assets tested include:
- Public-facing assets
- Internal Network
- Web Applications
- 3rd-Party Software
- Wireless Networks
PENETRATION TESTS PROVE THAT VULNERABILITIES ARE PRESENT AND CAN BE EXPLOITED BY ATTACKERS.
VULNERABILITY ASSESSMENTS SCAN YOUR ENVIRONMENT FOR WEAKNESSES WHICH PRESENT RISK.
PHISHING SIMULATIONS MEASURE THE LIKELIHOOD OF SUCCESSFUL ATTACKS AND THEIR POTENTIAL DAMAGE.