Periodic vulnerability scan
Snel op de hoogte van kwetsbaarheden
Practical advice from specialists
During this periodic scan, we monitor your application environment or the access point to your network with a vulnerability scanner. This gives you certainty about the correct design of the environment, you monitor its security and you fulfill the legal obligation to organize suitable security for the processing of personal data.
Our periodic vulnerability scans go through these phases:
We start with a discussion about the collaboration and test approach.
- First scan
We get to know your application environment and perform the first scan.
We will review the findings with you and establish a "baseline".
- Periodic scan
We periodically check your production environment and keep a log of this.
We will contact you as soon as new vulnerabilities are discovered.
You will receive a monthly report from us on the scans performed, with findings, advice and the current state of affairs.
Environments / servers configurations are often changed and new vulnerabilities are continuously exposed. That is why it is essential to have your environment monitored periodically. The more often we scan, the sooner you become aware of security vulnerabilities.
We perform scans with server login details at no extra cost. This allows the scanner to better assess your application environment. You determine whether scans are performed with or without login details.