Fixed price external vulnerability scan for up to 25 individual IP addresses. This non-exploitative test will report on detected vulnerabilities so that you can prioritize remediation efforts.
The Nivee External Vulnerability Scan (EVS) is a security assessment using specialized software to scan your company's external-facing systems and networks for potential vulnerabilities. The scan focuses on your company's internet-based services and checks against listed Common Vulnerabilities and Exposures (CVE). New vulnerabilities are continually being added to the CVE register and it is very important that businesses ensure their systems stay up-to-date with the relevant CVEs.
Common oversights which lead to successful Cyber Attacks:
- Lack of awareness of CVEs present in their system(s)
- Inadequate frequency of scans performed
- Lack of patching, updating and upgrading
- Constantly changing cyber threat landscape
The Nivee EVS proactively identifies and addresses vulnerabilities in your external-facing systems and networks which are typically the first line of defense against cyber attacks. By conducting regular external vulnerability scans, you can reduce the risk of a successful cyber attack and improve your businesses overall security posture.
Identify VulnerabilitiesIdentify potential vulnerabilities in your company's external-facing networks, and report on patching issues, configuration errors and other common vulnerabilities.
Comply with RegulationsComply with security regulations, such as PCI DSS, HIPPA, and other consumer protection laws.
Out of Date ResourcesOur scans will be able to tell which resources are outdated and contain known vulnerabilities. The scan will outline any updates, upgrades and patching that is required across the environment.
Protect ReputationAn external vulnerability scan can help to prevent cyber security incidents and protect your company's reputation.
What systems are being included?
Remote Access Servers (RAS)
Virtual Private Networks (VPN)
Internet of Things (IoT)
In general, any system or network that is accessible from the internet is considered to be an external-facing system or network. This includes both public-facing systems and networks, as well as those that are only accessible to authorized users. By conducting regular external vulnerability scans, organizations can identify and address vulnerabilities in these systems and networks, reducing the risk of a successful cyber attack.
Why you need regular scanning
Data BreachesData breaches can have serious consequences, including the loss of sensitive customer information and the potential for financial fraud.
Distributed Denial of Service (DDoS) attacksThe attackers use a network of compromised computers or devices, known as a botnet, to generate the traffic, making it difficult to defend against.
SQL injection attacksThis allows the attacker to gain access to sensitive information, such as user passwords or financial data, or even to take control of the website itself.
Phishing attacksThese attacks involve sending fraudulent emails or messages in order to trick the recipient into providing sensitive information, such as login credentials or credit card numbers.
Malware attacksThese attacks involve using malicious software, such as viruses or ransomware, to infect a website or the devices of its users
Out of Date SoftwareAttackers activiely look for software, plugins and APIs that our out dated. Many updates contain critical security enhancements.
Scan Externally Facing Systems and Networks
Identify Assets and Exposure
Identify Open Ports and Services
Identify Vulnerabilities in the Environment
Prioritize Vulnerabilities Found
Report on Vulnerabilities
*prices are in Canadian dollars and do not include applicable taxes.
Types of Cyber Security Assessments
The end result is a detailed report outlining and identifying any vulnerabilities found. Vulnerabilities will be categorized based on the severity that they pose to your system. This report will be a point-in-time assessment of your externally facing systems/networks.
How does it work?
The Nivee EVS has three main phases.
- Information Gathering
- Vulnerability Scanning and Enumeration