Sunteți pe pagina 1din 2

Vulnerability Scanning

Assessment & Compliance Services Division


847.221.0200 halock.com

Solution Overview
Solution Servers, applications, network infrastructure,
At-a-Glance: and other services, once connected to the
network, pose a risk to the organization.
 In depth scanning of re-
sponding system, network
Hackers and malicious users, both internally
infrastructure, platforms, and externally, may attempt to exploit these
and applications can be per- security weaknesses to gain access to
formed externally (internet sensitive information assets.
accessible), internally
(private), or both Identifying and remediating the risks is
 Locate and identify respond- critical to protecting the organization at the
ing hosts and services perimeter as well as throughout the internal
environment.
 Detect over 5,500 known
vulnerabilities across 500
Performed in a collaborative manner, vulnerability scanning identifies and evaluates as many
operating systems, applica-
tions, and protocols, ensur-
vulnerabilities as possible across The organization’s systems, applications, and underlying
ing the most comprehensive infrastructure. The testing can be performed both internally and externally.
and complete results
The organization will provide Halock with general information regarding network ranges as well
 Comprehensive reporting of
as specific systems of concern. Halock will map the entire ranges for responding hosts and
findings and risks
perform in-depth vulnerability scanning of responding hosts for security weaknesses such as
 Identify and document ap- vulnerable operating systems, web services, remote access, network service configurations, and
proaches and recommenda- application vulnerabilities. Efforts are focused on those systems or aspects of the environment
tions to resolve security
that appear to present the greatest potential for gaining access beyond perimeter security
vulnerabilities
controls.

Professional Services Included : Pricing:

 Pricing varies based on the


 Port scanning and network mapping to iden-  Review and analysis of scan results size, complexity, and depth of
tify responding systems testing
 Selective validation of identified key vul-
 External (internet accessible)
 Automated vulnerability testing of host, plat- nerabilities
scanning base pricing begins
form, and network devices at $2,500 for with additional
 Documentation of Findings
fees based on the number of
 Automated vulnerability testing aimed at web IP addresses tested
application related security issues (i.e. SQL
 Internal (private network)
Injection, ASP and CGI script vulnerabilities,
scanning base pricing begins
Cross-site scripting, Hidden-field manipula-
at $5,000 with additional fees
tion, Authentication vulnerabilities, Session based on the number of IP
hijacking, Database errors, Directory tra- addresses tested
versal, and Form field data validation)

1834 Walden Office Square, Suite 150 * Schaumburg, IL 60173 * 847.221.0200 * www.halock.com
847.221.0200 halock.com

Vulnerability Scanning: Scope Worksheet

The total number of IP addresses included in the scope for network discovery is as follows:
LOCATION NETWORK RANGES
External (Internet Accessible) Up to _____ Class C (or equivalent) Ranges

Internal (Private) Up to _____ Class C (or equivalent) Ranges

TOTAL Up to _____ Class C (or equivalent) Ranges

Following network discovery, hosts and applications will be selected for automated vulnerability assessment.
The total responding hosts, as estimated by The organization, are as follows:

REVIEW METHOD ESTIMATED RESPONDING HOSTS


Operating System & Platform External (Internet Accessible) Up to ____ IP Addresses
Internal (Private) Up to ____ IP Addresses
Total Up to ____ IP Addresses

Web Application External (Internet Accessible) Up to ____ IP Addresses


Internal (Private) Up to ____ IP Addresses
Total Up to ____ IP Addresses

Special considerations and/or other notes:

1834 Walden Office Square Suite 150 * Schaumburg, IL 60173 * 847.221.0200 * www.halock.com

S-ar putea să vă placă și