Vulnerability
Assessment

Security through pre-emptive assessment of existing infrastructure

New Zealand businesses experience threats and attacks from all over the world. They also come from within their own networks. These threats arm themselves with an arsenal of ever-increasing, sophisticated exploits.

Attackers go after infrastructure that connects to the internet. They enter and move within the network to attack other assets. Your business depends upon a robust IT infrastructure for business continuity.

Our Vulnerability Assessment services takes an independent ongoing view of cyber exposure. It enables a prioritised approach to reducing the real risk to your organisation, so that you can focus your limited resources on critical threats.

The service combines industry-leading technology with our Cyber Defence Operations expertise. This means we can constantly identify and prioritise vulnerable internal and external infrastructure.

Key deliverables

Visibility


Identify the IT assets (servers, desktops, network devices) in your environment. Track exposure to threats and the effectiveness of your security strategy over time.

Compliance


Assess your IT environment against industry benchmarks such as CIS.

Prioritisation


Guidance on where to focus remediation activity, enabling better security outcomes from limited resources.

Notification


Notification of any critical vulnerabilities as soon as they're detected. Reduce the window of exposure, and risk of compromise from high impact vulnerabilities.

Features

Leading technology


A cloud-based solution utilising industry leading technology deployed by Spark Professional Services.

24x7 dedicated expert support


Experienced cyber security analysts available when you need them.

Internet perimeter scanning


Conducted from the cloud. Identify vulnerabilities within your internet exposed infrastructure, including external hosting.

Endpoint scanning


Identify vulnerabilities on servers, desktops and devices within your organisation using network-based credentialed scans or via installed agents.

Compliance scanning


Scan and receive independent reporting on your compliance with industry benchmarks such as CIS.

Asset discovery


Discover and report new devices with network-based scans of defined areas in your network.

Asset prioritisation/tagging


Identify and group assets, with rules to prioritise and assign vulnerabilities to the correct resolver groups.

Ongoing tuning


Gain insight through constant optimisation to remove false positives/false negatives and iterative categorisation.

Critical vulnerability alerting


Reduce the time you're exposed to newly detected critical vulnerabilities through non-reporting-cycle notifications.

Detailed reporting


Independent, ongoing reporting on vulnerabilities, remediation and recommendation on prioritiszed assets, prepared and explained by experienced security analysts from our Cyber Defence Operations team.

Keen to get started or have questions?

Contact us and a security sales representative will get in touch.