CyberCompass™ now offers comprehensive vulnerability scans that not only provide in depth information but also integrate results into CyberCompass™ automated cyber risk management software. These scans can be used with pre-breach preparation and with incident response when a breach is discovered. Comprehensive scans that are now available include:
Operating system vulnerability and compliance scans – over 300 action Items tested along with cyber security rapid repair issues. This scan also outlines top priorities so systems and network can be quickly hardened.
Network discovery and inventory – provides an inventory of all devices connected to a company’s network. This network inventory provides the baseline for creating a sensitive data flow diagram necessary for protected information.
Network vulnerability scans – expose weaknesses of computers and network devices on the local network.
External network penetration testing – uses industry-standard methodology and tools to expose weaknesses in firewalls and where unauthorized access to network(s) can occur.
Sensitive data security scans – scans computer and network storage for unencrypted sensitive data including PHI, PCI and HIPAA and provides a report identifying unencrypted data.
Communications security scan – checks proper configuration of secure connections and includes SSL and TLS standards. The scan also includes a report that details corrective actions to secure and meet standards. This scan is not widely available with other scans so it is a unique feature to CyberCompass™.
Phishing risk assessment – determines where phishing has the greatest risk. A one-time or quarterly training package is also offered.
Source code security scans – target source code to determine security issues and identifies potential issues with the code.
Learn more about our surveyor tools and how we can help you learn your vulnerabilities and how to fix them.