-
Standard Vulnerability Assessment Service
-
Premium Vulnerability Assessment Service
-
Enterprise Vulnerability Assessment Service
Standard Vulnerability Assessment Service |
Premium Vulnerability Assessment Service |
Enterprise Vulnerability Assessment Service |
||||
---|---|---|---|---|---|---|
Vulnerability scanning on networks and applications to detect security flaws | ||||||
Vulnerability scanning on networks and applications to detect security flaws | 1 per year | 4 per year | 12 per year | |||
Classification of vulnerabilities by severity | ||||||
Classification of vulnerabilities by severity |
![]() |
![]() |
![]() |
|||
Configuration assessment to identify errors or inefficiencies | ||||||
Configuration assessment to identify errors or inefficiencies |
![]() |
![]() |
![]() |
|||
Report with detected vulnerabilities and explanatory details | ||||||
Report with detected vulnerabilities and explanatory details |
![]() |
![]() |
![]() |
|||
Recommendations for resolving or mitigating issues | ||||||
Recommendations for resolving or mitigating issues |
![]() |
![]() |
![]() |
|||
General suggestions for improving overall security | ||||||
General suggestions for improving overall security |
![]() |
![]() |
![]() |
|||
Advanced report with severity classification to define priority vulnerabilities and focus on critical issues | ||||||
Advanced report with severity classification to define priority vulnerabilities and focus on critical issues |
![]() |
![]() |
![]() |
|||
Targeted consulting to discuss results and recommendations | ||||||
Targeted consulting to discuss results and recommendations |
![]() |
![]() |
![]() |
|||
Customized solutions to improve business security and address the most urgent vulnerabilities | ||||||
Customized solutions to improve business security and address the most urgent vulnerabilities |
![]() |
![]() |
![]() |
|||
Rapid consulting with an expert team to resolve critical vulnerabilities or for urgent interventions | ||||||
Rapid consulting with an expert team to resolve critical vulnerabilities or for urgent interventions |
![]() |
![]() |
![]() |
|||
Advanced strategies to minimize risks and strengthen security | ||||||
Advanced strategies to minimize risks and strengthen security |
![]() |
![]() |
![]() |
|||
Proactive support to prevent threats with continuous consulting | ||||||
Proactive support to prevent threats with continuous consulting |
![]() |
![]() |
![]() |
|||
Scopri di più | Scopri di più | Scopri di più | ||||