Independent, Unbiased, technically-qualified security assessments
Did you know that nearly 20 new security vulnerabilities are discovered every day? Vulnerability scanning uses a variety of tools and techniques to examine your changing network for security gaps and misconfigurations. Regular vulnerability scanning is a critical element of successful information security programs. It is also required by merchants accepting credit card payments.
Sikich enjoys the privilege of working with leading payment card, financial, restaurant, hospitality, health care, and educational organizations from around the world. We assist you with information security consulting, fraud management, risk mitigation, and vulnerability detection and prevention.
Sikich security experts handle almost any conceivable assignment to do with digital security and data protection, including credit card data (PCI DSS), patient data (HIPAA), bank account numbers (GLBA), service provider reviews (SOC 1/2/3), and intellectual property. We specialize in compliance audits, penetration tests, computer security assessments, and computer forensic investigations.
Types of vulnerability scans
Internal
Our internal vulnerability scanning service is customized for your organization. Internal vulnerability scans test the security of those of your systems that are not exposed to the internet. This includes network infrastructure, servers, and workstations. Our solution automatically connects to Sikich through your firewall to conduct testing and transmit results.
External
Your external network likely consists of perimeter devices, such as routers and firewalls, as well as internet-accessible servers, like your email and web servers. External vulnerability scans are performed remotely by the Sikich scanning server network. Our solution only requires your network addresses. You don’t need to download, install, or configure any software.
How Sikich Delivers Vulnerability Scanning Services
Whether your business is a large corporation with multiple network blocks or a small company with only a single dynamic IP address, you’ll find our vulnerability scanning easy, effective, and affordable. You can log into the Sikich Compliance and Vulnerability Management Portal to securely view risks and threats against your network as well as your scheduled vulnerability scans.
Results and corrective recommendations are risk-ranked based on priority and provided in both summary and technically detailed formats, appropriate for executives and IT managers. As a user of the service, you can take advantage of email alerts, downloadable reports, graphs, trend analyses, resource tools, and real-time control over running scans to maximize your ability to respond to threats and secure your network.
Because we don’t expect you to become an information security expert, we offer personal, interactive support both before you start scanning and after your scan has finished. Our support experts work with you to provide guidance and help you interpret and analyze your report.
Information you can expect from your scan
Easy to Manage
You can plan and manage your security tests to fit your needs. Before each test you receive an email notifying you the test is about to begin. To postpone the testing, you can log into the web portal and reschedule the test. You can even monitor testing progress in real time, and use the same interface to cancel the test while it is running.
Simple Setup
You can set up your tests using our secure website to register your devices, the type of tests to perform, and when and how often they should run, from daily to annually. You can configure and review your test schedule and results anytime from a web browser on any computer, mobile device, or smartphone.
Expansive testing
The Sikich testing engine checks for tens of thousands of security vulnerabilities and is updated every day. Our service extends to all technologies on your network, including firewalls, routers, web servers, email servers, and application servers.
Accurate and complete
The Sikich testing engine is updated daily and checks for tens of thousands of security vulnerabilities. Our service is incredibly thorough, inspecting your firewalls, routers, web servers, email servers and application servers. Sikich has also been approved as meeting the requirements defined for Approved Scanning Vendors (ASV) in the Payment Card Industry Data Security Standard (PCI DSS).
Affordable
The price of vulnerability scanning varies depending on the number of devices tested and the frequency of tests. For a small organization we would typically recommend monthly security tests, at a cost that is significantly lower than that of a single penetration test and at a fraction of the cost of dealing with a security breach. For larger organizations, frequent tests may cost as little as penn