Documente Academic
Documente Profesional
Documente Cultură
Solution Overview
Solution Servers, applications, network infrastructure,
At-a-Glance: and other services, once connected to the
network, pose a risk to the organization.
In depth scanning of re-
sponding system, network
Hackers and malicious users, both internally
infrastructure, platforms, and externally, may attempt to exploit these
and applications can be per- security weaknesses to gain access to
formed externally (internet sensitive information assets.
accessible), internally
(private), or both Identifying and remediating the risks is
Locate and identify respond- critical to protecting the organization at the
ing hosts and services perimeter as well as throughout the internal
environment.
Detect over 5,500 known
vulnerabilities across 500
Performed in a collaborative manner, vulnerability scanning identifies and evaluates as many
operating systems, applica-
tions, and protocols, ensur-
vulnerabilities as possible across The organization’s systems, applications, and underlying
ing the most comprehensive infrastructure. The testing can be performed both internally and externally.
and complete results
The organization will provide Halock with general information regarding network ranges as well
Comprehensive reporting of
as specific systems of concern. Halock will map the entire ranges for responding hosts and
findings and risks
perform in-depth vulnerability scanning of responding hosts for security weaknesses such as
Identify and document ap- vulnerable operating systems, web services, remote access, network service configurations, and
proaches and recommenda- application vulnerabilities. Efforts are focused on those systems or aspects of the environment
tions to resolve security
that appear to present the greatest potential for gaining access beyond perimeter security
vulnerabilities
controls.
1834 Walden Office Square, Suite 150 * Schaumburg, IL 60173 * 847.221.0200 * www.halock.com
847.221.0200 halock.com
The total number of IP addresses included in the scope for network discovery is as follows:
LOCATION NETWORK RANGES
External (Internet Accessible) Up to _____ Class C (or equivalent) Ranges
Following network discovery, hosts and applications will be selected for automated vulnerability assessment.
The total responding hosts, as estimated by The organization, are as follows:
1834 Walden Office Square Suite 150 * Schaumburg, IL 60173 * 847.221.0200 * www.halock.com