External Vulnerability Assessment

The Service

Do your Internet connected systems have vulnerabilities? This basic question can be answered by waiting for the cyber-criminals to uncover the vulnerabilities for you, or you can do so proactively with an External Vulnerability Assessment.

Our External Vulnerability Assessment tests your network’s public access areas for vulnerabilities and security issues. This gives you the opportunity to correct problems before malicious attackers can exploit them to gain access to sensitive information. As the saying goes, an ounce of prevention is worth a pound of cure.

Our External Vulnerability Assessment deliverable includes a risk-rated listing of detected vulnerabilities and mitigation recommendations, which provides a clear roadmap for prioritizing and resolving detected deficiencies. We also provide repeat clients with trend reporting and graphs that illustrate your organization’s progress throughout 10-D engagements over time.

FFIEC guidelines state that institutions are required to perform an independent assessment of high-risk systems at least annually. That’s where we can help. Our security engineers are trained and experienced “ethical hackers,” who perform both manual and automated testing to ensure we discover all your vulnerabilities. Our clients benefit from flexible engagement options.  In addition to annual assessments, many of our clients also take advantage of quarterly reviews and multi-year engagements.

The Scope of Work

We tailor the scope of work to fit your institution’s needs and can include:

  • Port Scanning
  • Vulnerability Scanning
  • Domain Name Review
  • DNS Review

Man jumping canyon
Sailor at helm

The 10-D Security Difference
  • We comprehensively scan all 65,535 ports for each external facing IP address.
  • We search for 110K+ vulnerabilities including the most recently detected.
  • We complete a manual verification along with scanning to ELIMINATE false positives.
  • We have nationwide testing experience with ALL types and sizes of institutions.
  • Our proprietary tools capture and review key data in a fraction of the time.
You would benefit from a 10-D
External Vulnerability Assessment if
  • Your information security program calls for testing of high-risk areas.
  • You have Internet-connected devices.

Keep your institution off the evening news.

Contact Us