Vulnerability Assessment

85% of all organizations, who believe that they are safe, are actually vulnerable to the simplest hacks


Cyber Chimp, either by request or periodically, can identify, prioritize and report on your IP’s vulnerability posture. We use a variety of systems and tools for your vulnerability assessment (VA) which are updated and maintained daily. These systems have intelligence to inspect an object and identify the known vulnerability. The detailed analysis report provides guidance on remediation options.

Our process:

Once an order has been confirmed, Cyber Chimp engages with you to scope your assessment. This includes the desired IP(s) and rules of engagement including the clients permission to evaluate the risks, timing, and reporting preference. Once confirmed, we start the process and start assessing the risk profile on the assets. Our vulnerability assessment is perform by qualified engineers with a passion in discovering problems. Our systems are updated daily, so as not to miss any potential threats or zerodays. The process will take 24 hours to complete (with the exception of  in-depth scans). Finally a report is prepared and submitted for review.

The data is stored for 45 days, with the exception of CyberChimp’s free VA offering. Scan results are dependent on unrestrictive access and public availability. All scans are subject to a point in time scanning.


Discovery

Using the same tactics a hacker would to find you

  • Continuous discovery and scanning of network assets and web applications
  • Thousands of unique tests and deep scanning of perimeter assets and web apps to identify vulnerabilities
  • Scanning for OWASP Top 10 vulnerabilities in web applications

Assessment

Expert Testers Recommendation

  • A threat level is assigned to each vulnerability, based on its severity and the asset’s sensitivity
  • Practical remediation recommendations



Find security vulnerabilities in any Internet facing hosts

Detailed reporting for risk assessment with suggestions on best practice re-mediation

Vulnerability Alerts on detected change in scheduled report

Custom scan options; Network/Server, Web, WordPress and Joomla Scans

Easy to read reporting

Detailed explanation of the vulnerability found, linked to its own unique CVE number

All vulnerabilities are prioritized to assist you in identifying which ones to attend first as a matter of urgency.

A breakdown of summary and detailed section will be supplied in the report

Shows which ports are open, services associated, its versions and operating system in the back-end.

Services are tested for known vulnerabilities and misconfiguration (more than 53000 NVT checks)

Depending on the service and time, additional external tools can be used to further probe the host to identify further risks.


Background

A well known analogy of any organization is comparable to maintaining a ship. You want to ensure that everyone aboard is safe, that the crew know their roles to maintain the vessel, and steer the ship from A to B unharmed. You want an unsinkable ship. Many called the Titanic the unsinkable ship, however she met with her demise on her maiden voyage.  The designer did not anticipate the devastation from an iceberg and a few leaks.

Hackers live for finding cracks, they want to expose them and are determined to knows what lies beneath them.  Our role on this “ship” is to ensure that the hull is re-enforced, and nothing known can penetrate!


Pricing Plans

Name Your Price

With a wide variety of plans we can fit any request.


Alpha

1 IP
R 4999
  • check Scan 1 IP
  • check Full Report emailed
  • close Re-occuring payment
Order now

Bravo

5 IP's
R 220
  • check Scan 5 IP's
  • check Full Report emailed
  • check Re-occurring payment
Order now

Delta

100 IP's
R 3600
  • check Scan 100 IP's
  • check Full Report emailed
  • check Re-occurring payment
  • check Cheapest Rates
Order now
If ordering to scan for more than 100 IP's, this is subject to a quote for the best rates.



To understand the full difference between the free lite offering and our standard solution, please click here.

Alternatively please contact us.


15'372 Websites hacked daily

Don't be the next: we can help you!


Get in touch

Request your free quote today!


Email Contacts






    Background


    Support

    Midrand, Johannesburg

    info@cyberchimp.co.za


    Follow us