MENU

Vulnerability Assessments & Penetration tests

Providing you with critical security information in a relevant way

 

Do you know:

1.  How vulnerable your network and perimeter are?

2.  What your top priorities are to improve your security posture of your systems and achieve compliance?

3.  Whether your overall security program is as effective as it should be?

At SSS we have effective services and tools available to help you answer these questions.

 

Vulnerability Management and Assessment

Vulnerability Assessment and Remediation is one of the most important IT Security activities to help protect your organisation.  This cannot simply be treated as a one-off activity, but should be part of your ongoing monitoring and assessment activities to ensure you are able to take corrective action before your security is compromised.

An effective solution allows you to:

  • Perform regular scanning.
  • Assess the potential threat of detected vulnerabilities.
  • Prioritise your remediation efforts.

This allows you to answer these questions:

  • How business-critical or sensitive is the vulnerable asset?
  • Have any intrusions or exploits been attempted on the vulnerable asset?
  • How is the vulnerability being exploited by attackers in the wild?

Whether you have the resources to implement our vulnerability assessment tools, or whether you need support to help you manage the process - we have the right solution for you!

Click here to request your free trial and demo now

Penetration Testing

Penetration testing is a useful for checking that your critical publically facing systems are best deployed to protect your organisation from bad actors.

SSS partners with expert external providers to perform a penetration testing service upon request.  Our highly experienced consultants offer added value by providing useful context to support the report you will receive with findings from the testing.

 

 

section icon security consulting Solutions + Partners

  • SSS Vulnerability Management as a Service (VMaaS)

    Vulnerability assessment and remediation is one of the most important cyber security activities to help protect your organisation.

    Vulnerability assessment and remediation is one of the most important cyber security activities to help protect your organisation.  

    The SSS Vulnerability Management as a Service will make your vulnerability assessment and remediation easier and more cost effective for you.

     

    • Built on AlienVault's® Unified Security Management® (USM) platform and combined with our expertise.
    • Competitively priced monthly payments with no minimum commitment - cancel anytime.
    • Discounts apply on contracts that are 12 months and over.

    • Tailored to suit your organisation.
    • Prioritise your vulnerability remediation efforts where you need it the most.

     

    * Simplified * Scalable * Efficient *

    * Free Demo and Trial *

     Request your free demo and trial 

     What do you get?

    Automated Asset Discovery

    • Visibility of all assets connected to your networks
    • Determine what software and services are installed using map scans and Passive Real-time Asset Detection System scanning.
    • Daily scans that can be adjusted to suit.

    Vulnerability Scanning

    • Scheduled and on-demand authenticated and unauthenticated scans.
    • Authenticated scans use host credentials to investigate assets in more detail, perform analysis and look for signs of potential infiltration.

    Reporting

    • Weekly and monthly reports customised to suit your requirements.
    • Reports on detected vulnerabilities and prioritised remediation plans to help you prioritise your patching and remediation efforts where you need it the most.

     Access to the AlienVault® Unified Security Management® Platform

    • Run your own scans whenever you like with the AlienVault USM platform. 

     

    Want to know more?  Download our brochure now!

    Download copy of VMaaS brochure

     

    Need a more comprehensive solution that addresses Security Operations?

    Our Security Operations service offers additional AlienVault® functionality that include the following:

    • Intrusion Detection.
    • Behavioural Monitoring.
    • SIEM and Log Management.
    • Correlation of user behaviours and logs.  

     Click here to read more about the SSS Security Operations service.

      Contact us today

     - - - - - - - - - - - - - - - - - -

    AlienVault logo

    We've built our Security Operations Service on AlienVault® Unified Security Management® (USM).   They deliver built-in intrusion detection systems as part of an all-in-one unified security management console.  With AlienVault® you are able to detect threats as they emerge in your critical cloud and on-premises infrastructure.  Expert threat intelligence is updated every 30 minutes and analysed.  This include data submitted by more than 80,000 participants from more than 140 countries.

    Read More about AlienVault- - - - - - - - - - - - - - - - - -

    SSS solutions mapped against CERT controls

     

    Follow us on LinkedIn

     

  • AlienVault ®

    AlienVault® offers you a new approach to today's evolving security challenge.

    Unified Security for Threat Detection, Incident Response, and Compliance

    AlienVault® offers you a new approach to today's evolving security challenge. 

    AlienVault® Unified Security Management® (USM) delivers built-in intrusion detection systems as part of an all-in-one unified security management console.

    It includes:

    • built-in host intrusion detection (HIDS),
    • network intrusion detection (NIDS), and
    • cloud intrusion detection for public cloud environments including AWS and Microsoft Azure. This enables you to detect threats as they emerge in your critical cloud and on-premises infrastructure.

    AlienVault USM ScreenshotClick here for the AlienVault USM overview

    Detect threats as they emerge

    To ensure that you are always equipped to detect the latest emerging threats, the AlienVault® Labs Security Research Team delivers continuous threat intelligence updates directly to the USM platform.  Over 19 million threat indicators are contributed daily.

    AlienVault - over 19 million threat indicators contributed daily

    Expert threat intelligence updated every 30 minutes and analysed

    Expert threat intelligence is updated every 30 minutes and analysed.  This threat data is backed by the AlienVault Open Threat Exchange® (OTX™) - the world’s first open threat intelligence community made up of more than 80,000 participants from more than 140 countries.

    AlienVault world map

    AlienVault® enables you to be more effective in your vulnerability management processes

    • Leverage intrusion detection for any environment with built-in cloud IDS, network IDS, and host-based IDS (including File Integrity Monitoring (FIM)).
    • Use the Kill Chain Taxonomy to quickly assess threat intent and strategy.
    • Make informed decisions with contextual data about attacks, including a description of the threat, its method and strategy, and recommendations on response.
    • Use automatic notifications so you can be informed of key threats as they happen.
    • Work more efficiently with powerful analytics that uncover threat and vulnerability details in an all-in-one console.

    What do you get?

    • Asset discovery and inventory
    • Vulnerability assessment
    • Intrusion detection
    • Endpoint detection and response
    • SIEM and Log Management
    • Behavioural Monitoring

    Click here to try the AlienVault online demo now

  • Tripwire

    Breaches, exploits and cyber-attacks that prey on ambiguity, gaps and oversights put your sensitive data at risk.

    Breaches, exploits and cyber-attacks that prey on ambiguity, gaps and oversights put your sensitive data at risk. To protect it, you need control over security configurations and changes, and visibility into events of interest across physical, virtual and cloud-based IT infrastructures. Tripwire VIA gives you control of your IT infrastructures to protect your organization's critical data.

    Tripwire provides: