$899 External
Vulnerability Scan

Reach out for your Security Scan

Fixed price external vulnerability scan for up to 25 individual IP addresses. This non-exploitative test will report on detected vulnerabilities so that you can prioritize remediation efforts.


The Nivee External Vulnerability Scan (EVS) is a security assessment using specialized software to scan your company's external-facing systems and networks for potential vulnerabilities. The scan focuses on your company's internet-based services and checks against listed Common Vulnerabilities and Exposures (CVE). New vulnerabilities are continually being added to the CVE register and it is very important that businesses ensure their systems stay up-to-date with the relevant CVEs.

Common oversights which lead to successful Cyber Attacks: 

  • Lack of awareness of CVEs present in their system(s)
  • Inadequate frequency of scans performed
  • Lack of patching, updating and upgrading
  • Constantly changing cyber threat landscape

The Nivee EVS proactively identifies and addresses vulnerabilities in your external-facing systems and networks which are typically the first line of defense against cyber attacks. By conducting regular external vulnerability scans, you can reduce the risk of a successful cyber attack and improve your businesses overall security posture.

Identify Vulnerabilities

Identify potential vulnerabilities in your company's external-facing networks, and report on patching issues, configuration errors and other common vulnerabilities.

Comply with Regulations

Comply with security regulations, such as PCI DSS, HIPPA, and other consumer protection laws.

Out of Date Resources

Our scans will be able to tell which resources are outdated and contain known vulnerabilities. The scan will outline any updates, upgrades and patching that is required across the environment. 

Protect Reputation

An external vulnerability scan can help to prevent cyber security incidents and protect your company's reputation.

What systems are being included?


Email Servers

Remote Access Servers (RAS)

Virtual Private Networks (VPN)

Internet of Things (IoT)

In general, any system or network that is accessible from the internet is considered to be an external-facing system or network. This includes both public-facing systems and networks, as well as those that are only accessible to authorized users. By conducting regular external vulnerability scans, organizations can identify and address vulnerabilities in these systems and networks, reducing the risk of a successful cyber attack.

Why you need regular scanning

Data Breaches

Data breaches can have serious consequences, including the loss of sensitive customer information and the potential for financial fraud.

Distributed Denial of Service (DDoS) attacks

The attackers use a network of compromised computers or devices, known as a botnet, to generate the traffic, making it difficult to defend against.

SQL injection attacks

This allows the attacker to gain access to sensitive information, such as user passwords or financial data, or even to take control of the website itself.

Phishing attacks

These attacks involve sending fraudulent emails or messages in order to trick the recipient into providing sensitive information, such as login credentials or credit card numbers.

Malware attacks

These attacks involve using malicious software, such as viruses or ransomware, to infect a website or the devices of its users

Out of Date Software

Attackers activiely look for software, plugins and APIs that our out dated. Many updates contain critical security enhancements.



Scan Externally Facing Systems and Networks

Identify Assets and Exposure

Identify Open Ports and Services

Identify Vulnerabilities in the Environment

Prioritize Vulnerabilities Found

Report on Vulnerabilities

External Scan


Get in Touch

*prices are in Canadian dollars and do not include applicable taxes.


Types of Cyber Security Assessments



The end result is a detailed report outlining and identifying any vulnerabilities found. Vulnerabilities will be categorized based on the severity that they pose to your system. This report will be a point-in-time assessment of your externally facing systems/networks.

How does it work?
The Nivee EVS has three main phases.

  1. Information Gathering
  2. Vulnerability Scanning and Enumeration
  3. Reporting

Ready to get started?

Book an assessment with our certified security specialists today!

Book an Assessment