Service through which infrastructure assets are evaluated in search of known vulnerabilities. The equipment that can be analyzed are servers, PCs, switches, routers, printers, wireless, mobile devices, and any equipment that has an IP address.
At the end of each evaluation an executive report is delivered with the vulnerabilities found, as well as recommendations for their mitigation.
- Maintain a preventive security control of the analyzed infrastructure. - Avoid the use of contingencies due to the exploitation of vulnerabilities. - Avoid loss and leakage of information that compromises the integrity, confidentiality and availability of information.