Doorlopend inzicht

Snel op de hoogte van kwetsbaarheden

Practical advice from specialists

In brief

During this periodic scan, we monitor your application environment or the access point to your network with a vulnerability scanner. This gives you certainty about the correct design of the environment, you monitor its security and you fulfill the legal obligation to organize suitable security for the processing of personal data.

Working method

Our periodic vulnerability scans go through these phases:

  • Converstation
    We start with a discussion about the collaboration and test approach.
  • First scan
    We get to know your application environment and perform the first scan.
  • Feedback
    We will review the findings with you and establish a "baseline".
  • Periodic scan
    We periodically check your production environment and keep a log of this.
  • Notification
    We will contact you as soon as new vulnerabilities are discovered.
  • Rapportage
    You will receive a monthly report from us on the scans performed, with findings, advice and the current state of affairs.

Investment

Environments / servers configurations are often changed and new vulnerabilities are continuously exposed. That is why it is essential to have your environment monitored periodically. The more often we scan, the sooner you become aware of security vulnerabilities.

We perform scans with server login details at no extra cost. This allows the scanner to better assess your application environment. You determine whether scans are performed with or without login details.

To get going

Do you want permanent certainty about the safe setup of your servers or sites? Then contact us now for a no-obligation introductory meeting.