Vulnerability Assessments & Penetration tests

Providing you with critical security information in a relevant way

SSS’ Vulnerability Assessment and Penetration Testing helps you answer these difficult questions:

1. How secure and compliant is my network?

2. What are the top actions we can take right now to improve security and achieve compliance?

3. Is our overall security program effective?

 We tie our findings into your security posture and risk assessment information to ensure the information you receive is of business relevance.

With network vulnerability assessment, you can find the weak spots in your critical assets and take corrective action before attackers exploit them to sabotage your business or steal your confidental data.

Constant application updates and changes to application and system configurations can introduce vulnerabilities and leave you susceptible to an attack, even if you are keeping your security controls up to date. To keep your data secure, you must continuously scan your systems and devices to detect vulnerabilities as they arise.

Once detected, you must assess the potential threat of those vulnerabilities and prioritize your remediation activities to deal with the greatest threats first. This is no small task, as you must consider multiple factors:

  • How business-critical or sensitive is the vulnerable asset?
  • Have any intrusions or exploits been attempted on the vulnerable asset?
  • How is the vulnerability being exploited by attackers in the wild?

section icon security consulting Solutions + Partners

  • SSS Vulnerability Management as a Service (VMaaS)

    Vulnerability assessment and remediation is one of the most important cyber security activities to help protect your organisation.

    Vulnerability assessment and remediation is one of the most important cyber security activities to help protect your organisation.  

    SSS VMaaS will make your vulnerability assessment and remediation easier and more cost effective for you.

    • We can help you tailor the VMaaS solution to suit your organisation. 
    • Pricing is competitive with discounts on contracts that are 12 months and over.
    • Pricing is based on the number of devices (IP addresses) in your environment. 
    • There are optional functional uplifts available.

    To download the SSS Vulnerability Management as a Service datasheet, click on the download option on the right.

    Overview of the SSS VMaaS solution        


    • We offer competitive pricing with monthly payments and no minimum term commitment.  Discounts apply on contracts that are 12 months and over.
    • Ongoing, regular and effective scanning of all targeted systems and networks.
    • Easily scalable.  Additional sensors can be deployed for remote or isolated networks.
    • Reports are prioritised and contextualised specific to your environment(s) using agreed metrics to provide reporting to your IT and leadership teams.
    • More efficient use of your IT resources for patching-related tasks allowing you more time for other priorities.
    • Easily extendible to do even more automated IT Security management for your organisation.

    At a glance:

    • Built on AlienVault's Unified Security Management (USM) platform®, combined with our processes and expertise.
    • Simplifies security by combining asset discovery and vulnerability management, among other things.
    • Combines multiple essential security monitoring capabilities for cloud, hybrid-cloud or on-premise environments.
    • Delivers continuously updated threat intelligence about bad actors and attack methods as well as from the Open Threat Exchange.

    With the SSS VMaaS you get the following:

    • Automated asset discovery - visibility into all assets connected to your networks and determines what software and services are installed on them.
    • Vulnerability scanning - you can have scheduled and on-demand authenticated scans across your network(s).  This does not include patching.
    • Reporting - Ad hoc weekly and monthly reports (that can be customised) on detected vulnerabilities, prioritised remediation plans, metrics against your patch management processes, and reporting on different asset groups for the current period.
    • Access to the AlienVault USM (management) platform - you will be able to define and run your own scans as and when you like across your entire environment, or parts thereof.
    • Extra AlienVault® USM functions of Intrusion Detection, Behavioural Monitoring and SIEM and Log Management are also available.
  • AlienVault

    AlienVault Unified Security Management (USM) provides built-in network vulnerability assessment capabilities to identify vulnerabilities across your cloud, on-premises, and hybrid environments.

    AlienVault Unified Security Management (USM) provides built-in network vulnerability assessment capabilities to identify vulnerabilities across your cloud, on-premises, and hybrid environments.

    Continuously Scan and Monitor Your Environments

    • Easily set up network vulnerability assessment scans targeting individual assets, asset groups, or even entire networks
    • Schedule vulnerability assessment scans to run automatically at regular intervals so you don’t have to manage your scanning routine manually
    • Meet security best practices and regulatory requirements for frequent detection of assets and scanning for vulnerabilities
    • See all assets in your environments and where they are most vulnerable

    Remediate Your Vulnerabilities Faster

    • Use graphically-rich dashboards, pre-built reports, and customizable data views to quickly identify where vulnerabilities exist across your environments
    • Review vulnerabilities by their severity, so you can better prioritize your response
    • Quickly identify the availability of any patches, reducing the time you would typically need to research how to remediate the risk from the vulnerability

    Receive Regular Updates to Vulnerability-Related Threat Intelligence

    • Receive continuously updated vulnerability signatures from the AlienVault Labs Security Research Team
    • Identify the history of vulnerabilities on assets and the availability of any patches
    • Investigate vulnerabilities and threats deeper with links to CVE reports in the Open Threat Exchange (OTX)
  • Tripwire

    Breaches, exploits and cyber-attacks that prey on ambiguity, gaps and oversights put your sensitive data at risk.

    Breaches, exploits and cyber-attacks that prey on ambiguity, gaps and oversights put your sensitive data at risk. To protect it, you need control over security configurations and changes, and visibility into events of interest across physical, virtual and cloud-based IT infrastructures. Tripwire VIA gives you control of your IT infrastructures to protect your organization's critical data.

    Tripwire provides: