Blue Goat Cyber

Vulnerability Assessment

Medical Device Cybersecurity Assessment & Penetration Testing Services

Vulnerability Assessment Services

Steps to Schedule Your Vulnerability Assessment:

cyber-security-1

A Vulnerability Assessment is the process of evaluating assets in an enterprise for missing patches and misconfigurations. Often the vulnerability assessment is in support of regulatory compliance or compliance with a standard. The process identifies and prioritizes vulnerabilities based on criteria such as the likelihood of the vulnerability being exploited and the severity of the vulnerability – what the vulnerability provides the attacker when used. These criteria are used to categorize the vulnerability as Critical, High, Medium, Low, or Informational.

We assess systems using vulnerability scanning tools and manual methods to identify and prioritize findings based on the criticality of system vulnerabilities. We scrub findings to eliminate false positives and prioritize risk, based on existing security controls for your environment. The Vulnerability Assessment looks for missing patches and existing vulnerabilities for each system. We use authenticated scans wherever possible to reduce false positives and improve accuracy.

We typically perform a Vulnerability Assessment on an internal enterprise environment and a Penetration Test against the external, public-facing systems. We can, however, perform a Vulnerability Assessment against your external systems and wireless systems as well.

BENEFITS / RETURN ON INVESTMENT (ROI)

The majority of attacks take advantage of unpatched or misconfigured systems or applications.  Our Vulnerability Assessment service helps you identify vulnerable systems and applications. We provide prioritized, risk-based step-by-step actions to fix the identified vulnerable systems and applications. Our Vulnerability Assessment not only looks for unpatched systems, but checks for misconfigured systems, applications, and unnecessary services.  Our Vulnerability Assessment service also helps ensure your IT assets are compliant with policy and standards, such as the following:
  • PCI DSS
  • HIPAA
  • FISMA
  • DISA STIGs
  • GLBA guidelines
  • OWASP
  • NIST

WHAT YOU GET / DELIVERABLES

You get three items:
  • Vulnerability Assessment Report
  • Vulnerability Assessment Report Findings Review with your team via an online session
  • Discounted Rerun Option for a rerun of the Vulnerability Assessment after you fix identified problems
1. Vulnerability Assessment Report
Our Vulnerability Assessment Report includes the devices (IP addresses, applications, URLs, etc.) tested, vulnerabilities discovered, steps taken during the assessment, and prioritized recommendations. Our report has many useful elements such as an Executive Summary, Top 5 Findings, Top 5 Vulnerable systems, etc. We make every effort possible to produce a report free of false positives and easy to understand.  Our aim is to provide value to you for the purpose of making your environment more secure.
alpine-security-vulnerability-assessment-summary
VulnerabilityAssessmentswithGuaranteedFindings
2. Vulnerability Assessment Report Findings Review
We schedule an online session with you where we walk through the report with your team and answer any questions about the findings, our methods, or the steps required for remediation. Many competitors deliver a confusing lengthy report at the end of the assessment for you to decipher. Our vulnerability assessment report review adds tremendous value because we can clarify findings and remediation steps.
3. Discounted Rerun Option

VULNERABILITY ASSESSMENT FAQS

What is a false positive?
A false positive is when a vulnerability assessment tool indicates a vulnerability exists – tests positive for the vulnerability, when the vulnerability does not actually exist. This is a common problem with vulnerability assessments. Many of our competitors do not eliminate false positives and provide you a lengthy report riddled with false positives. This wastes your time and will have you chasing ghosts. We work with you to eliminate false positives by learning your environment, using authenticated assessment scans, demonstrating proficiency in our tools and methods, and by leveraging our experience, team, and expertise.
What is the difference between a vulnerability assessment and penetration test?
How often should we have a vulnerability assessment performed?
Ideally, you would have a continuous vulnerability assessment and remediation program. Organizations that do not routinely scan for vulnerabilities and address these vulnerabilities are more likely to be breached. We offer a subscription-based Vulnerability Assessment model to help you address the requirement for continuous vulnerability assessment and remediation.
What happens if while performing the vulnerability assessment you discover we already are infected?
This is quite common. Any existing malware or breaches discovered during the vulnerability assessment will immediately result in a cessation of testing and be brought to the attention of the designated Point of Contact (POC). We can help with incident response, digital forensics, and malware analysis.
Is the vulnerability assessment performed remotely or onsite?
For an Internal Vulnerability Assessment, we have two options: 1) Onsite. We travel to your location and perform this service onsite.  To leverage the fact that we will be traveling to your location, we offer to bundle (at a discount) other services that require us to be onsite with the Internal Vulnerability Assessment, such as our Wireless Penetration Test and Physical Security Review. 2) Remote. We perform the assessment remotely, using a VPN connection to your internal environment, by installing our tools on a system you give us access to, or by providing a virtual machine for you to run in your environment.
What is an “authenticated” vulnerability assessment?
An authenticated vulnerability assessment is the most accurate. This is where we use credentials during the scan. This can be Windows Domain credentials, Linux credentials, or database credentials. Rather than guessing at an application version or patch level, the authenticated scan can check the actual files on the system. As an example, if a recent DLL file fixed a vulnerability with a Microsoft Windows service, the authenticated scan can test for that exact DLL version.

Have questions or interested in a medical device cybersecurity assessment or penetration test?

Complete the form below and we’ll get back with you right away. We appreciate your interest.

Medical Device Cybersecurity

Security understands that often the key objective of testing medical devices is to assist

CISO-as-a-Service

We help you mature your cybersecurity posture in alignment with your compliance requirements and business objectives.

Data Breach Prevention Audit

Our Breach Prevention Audit is designed to quantifiably measure your risk of a data breach.

Penetration Testing Services

How secure is your network? When is the last time you tested your cybersecurity defenses?

Vulnerability Assessment Services

A Vulnerability Assessment is the process of evaluating assets in an enterprise for missing patches

Cybersecurity Risk Management

Most CIO/CISO’s believe that the protection of intellectual property from external threats

Our purpose is simple — to make your organization secure

The number of cybersecurity incidents continues to climb. The variety of attacks continues to grow. It is no longer a question of if you will have a cyber event.

0
Training Courses Offered
0
Certifications Earned
0
Companies Served