ITH

Vulnerability scans

Vulnerability scan of the network against internal and external attacks performed using the Tenable Nessus tool,

Explore the offer

100 PLN

/msc

ORDER ITH
ITH

Services ITH Vulnerability scans are available to service customers ITH

Check out ITH Net

Scope of service

ITH

Databases

  • Oracle, SQL Server, MySQL, DB2, Informix/DRDA, PostgreSQL, MongoDB
ITH

network devices:

  • firewalls/routers/switches, printers, network drives,
ITH

threats:

  • malicious processes/audit of anti-virus systems,
ITH

web applications:

  • servers and web services, OWASP vulnerabilities,
ITH

operating systems:

  • Windows, OS X, Linux, Solaris, FreeBSD, Cisco iOS,IBM iSeries
ITH

audit of industrial automation systems:

  • SCADA systems, built-in devices and ICS applications,
ITH

public cloud:

  • scanning of application and instance configurations in clouds such as Salesforce and AWS,
ITH

virtual environments:

  • VMware ESX, ESXi, vSphere, vCenter, Microsoft, Hyper-V i Citrix Xen Server
ITH

REPORTING AND MONITORING by vulnerability or by device.

  • summaries for management and notifications of scanning results,
  • recommendations for corrective action and improvement.
  • the possibility of comparing the results of different scans to highlight changes,
  • risk and vulnerability assessment based on the Common Vulnerability Scoring System (CVSS) severity levels (Critical, High, Medium, Low, Informative).

ITH Vulnerability scans

100 PLN / month ORDER

Write to us

Support
Maintenance

ITH NOC
Management Center
Infrastructure ITH
Open all week, 24 hours a day

Solutions
for you

ITH sales team
Open Monday through Friday from 9:00 a.m. to 8:00 p.m.