During this periodic scan, we monitor your application environment or the access point to your network with a vulnerability scanner.
This gives you certainty about the correct design of the environment, you monitor its security and you fulfill the legal obligation to organize suitable security for the processing of personal data.
Our periodic vulnerability scans go through these phases:
Conversation
We start with a discussion about the collaboration and test approach.
First scan
We get to know your application environment and perform the first scan.
Feedback
We will review the findings with you and establish a "baseline".
Periodic scan
We periodically check your production environment and keep a log of this.
Notification
We will contact you as soon as new vulnerabilities are discovered.
Report
You will receive a monthly report from us on the scans performed, with findings, advice and the current state of affairs.
Do you want continuous assurance of the secure configuration of your servers or sites? Contact us now for an obligation-free introductory discussion.