Vulnerability scanning

Continuous monitoring.

We schedule your scans, review your results and provide assistance on how to fix vulnerabilities that threaten your systems.

By performing recurrent automated scans, you get informed as soon as vulnerabilities appear on your network. Vulnerabilities are prioritised so that you can focus on fixing the most critical ones first and you can satisfy compliance requirements related to vulnerability management such as PCI DSS and HIPAA.

Typical vulnerability scanning process

Our security engineers are here to support you
and help you secure your web applications and web services.

Step 1

Scope identification

The process starts with an identification of the scope of systems that will be scanned and the desired schedule to run the scans.

Step 2

Vulnerability scanning

The automated scanner identifies external and/or internal network vulnerabilities such as configuration defects, outdated software and firewall misconfigurations.

Step 3

Remediation of vulnerabilities

We provide a detailed report that includes useful guidance on how to eliminate or mitigate the vulnerabilities and reduce risks.

Step 4

Retest and resolution

We will re-run the scanning on the previously identified vulnerabilities to confirm satisfactory resolution of each finding.

Different types of vulnerability scanning

Find and fix security holes in your external systems, internal networks, web applications and APIs.

This type of scanning is conducted from the Internet to identify vulnerabilities on your external network such as systems in your DMZ.

This type of scanning check vulnerabilities as seen from within your internal networks such as your LAN and evaluates threats coming from within your organisation.

This type of testing is designed to produce reports validated by an ASV (Approved Scanning Vendor) in order to validate compliance with PCI DSS Requirement 11.2. 

This type of scanning allows to go beyond the identification of network services by allowing the scanner to authenticate to systems and gather additional security information such as the list of installed software versions and common misconfigurations.

This is a cloud-based service that provides automated crawling and testing of custom web applications to identify common web-related vulnerabilities. The service can also be used to test SOAP and REST API services such as IoT services and mobile app backends.

Why 247 CyberLabs?

​We use the best solution on the market to help you efficiently manage vulnerabilities
without the costs of a full manual penetration test.

Automated scans

The service enables continuous monitoring of vulnerabilities by defining the frequency and timing of the scans. Scanning occur automatically and reports are issued directly after each scan is completed.

Reduced administration costs

Scanning provides a means to identify vulnerabilities and evaluate risks without the cost, time and manual efforts associated with of a full penetration test.

Industry leading technology

Our service is built upon the industry leading Qualys technology and service offering which we compliment with legendary support from our team. We help you manage those false positives and understand your results.

Clear reporting

The executive summaries and detailed reports ensure that you fully understand your risks and recommendations are provided to manage vulnerabilities.

Fixed price proposals

Our proposals are broken down into a costing table detailing each phase and the associated pricing. No surprise costs involved.

Enterprise-grade support

Our unparalleled support includes a response to all questions within 24h and direct access to your lead consultant for those situations where you cannot wait for an answer.