Comprehensive Vulnerability Assessment and Threat Reconnaissance
A complete and comprehensive Vulnerability and Threat Reconnaissance report covering all aspects of your organisation's digital footprint.
We map your digital footprint and then analyse for weaknesses with automated vulnerability tools. These identify:
These tools identify the low hanging fruit that attackers leverage to breach your security. This is not a penetration test. For most organisations, penetration testing should not even be considered until a vulnerability assessment has been performed and remediation undertaken.
Once we have a digital footprint Open Source Intelligence gathering is then used to identify:
This is an intensive report that uncovers every aspect of your organisation that can be used in an attack against you. The full threat assessment requires many hours of meticulous human investigation to detect vulnerabilities and document leaks that automated tools are not able to detect.
This is priced with reference to the scale of your organisation and the scope of work required.
Comprehensive assessments can be conducted on third parties using Open Source Intelligence techniques. A thorough investigation by our Intelligence specialists will gather all data publicly available on a target.
A full digital footprint is provided that covers every aspect of their online presence. Document leaks and credential breaches are identified and reported on.
Please note: for third party analysis we cannot provide the source material that contains sensitive data. We are unable to conduct vulnerability scanning on third party assets.