Vulnerability Assessment
Types of Vulnerability Assessments
-
Vulnerability Assessment
Includes a network scan of all devices using the Qualys Engine, manual false-positive testing, and a report of all identified vulnerabilities and our recommendations for each on how to improve.
-
Enhanced Vulnerability Assessment
Includes a Qualys network scan of all devices, more intense false positive identification, and advanced manual vulnerability testing. After the engagement, we provide you with a comprehensive report with all identified vulnerabilities and our recommendations for each on how to improve.
-
Comprehensive Network Vulnerability Assessment
Includes a Qualys network scan of all devices, more intense false positive identification, advanced manual vulnerability testing, and onsite assessment of vulnerabilities. After the engagement, we provide you with a comprehensive report with all identified vulnerabilities and our recommendations for each on how to improve.
-
Vulnerability Management Software
For an additional fee, TraceSecurity offers our proprietary Vulnerability Management software to run additional scans on demand. You and your team can also assign, perform, and track remediation efforts in one place, showing improvement over time.