Vulnerability Scanning


Vulnerability Scanning

from 10.00

This Team Leader driven vulnerability assessment against your IP address spaces follows the PTES (penetration testing execution standard) methodology for vulnerability assessments and is conducted by CREST registered testers. It is designed to identify potential vulnerabilities in your IP address space and provide recommendations for improving your security posture.

Add To Cart


Our vulnerability assessment service is built upon a testing methodology that has evolved over the last 12 years. Based on the reconnaissance steps from the Penetration Testing Execution Standard, our methodology involves bringing the results together from three separate commercial scanning solutions along with finer testing using our internally developed scanners.

Once all of your IP address space in scope has been assessed, the report is created in a format that allows you to assess their relative business risk and the cost of remediation.

Why run a vulnerability assessment

External infrastructure-related vulnerabilities tend to arise from poor hardware configurations, ineffective system configuration parameters and weak security system controls. Ensuring you know about your vulnerability allows you to patch and fix before an attacker can gain control of resources on the network. 


Our vulnerability assessment service will help you:

  • Gain real-world insight into your vulnerabilities;

  • Identify any patches that need to be installed;

  • Reconfigure software, firewalls and operating systems; and

  • Identify needs for encryption or more secure protocols.


Our vulnerability scanning process is as follows:

  • Once you have placed an order, a review meeting is taken by the assigned penetration tester and our CEO to ensure we are going to test to a sufficient level.

  • We will launch the scans a time and date agreed by you.

  • A detailed report that identifies and explains the vulnerabilities and their impact to your organisation.

  • An executive summary that explains what the risks mean in business terms.


  1. The price is by blocks of IP addresses.

  2. This is an external assessment only.

REQUIRE A MORE IN-DEPTH Vulnerability Assessment?

We’ve designed our standard packages to be easy and affordable, but if you are unsure of your requirements, or your needs are more complex and involve attempting advanced exploitation of the identified vulnerabilities, please call us to discuss. Our consultants can answer your questions and make the process painless. If you would like to talk to one of our testers or meet with them, we would be happy to arrange this for you.


Vulnerability Assessments should only be carried out by experienced testers with the necessary technical skill set and qualifications. Our penetration testers have strong technical knowledge and a proven track record in finding security vulnerabilities and can carry out exploits in a safe manner and advise on appropriate mitigation measures to ensure that your systems are secure.

Our penetration testers are OSCP (Offensive Security Certified Professional), OSWE (Offensive Security Web Expert) and CREST (Certified Register of Ethical Security Testers) certified. Our penetration testing team will provide you with clarity, technical expertise and peace of mind knowing that your web application has been reviewed by experienced testers in line with your business requirements.

Ask a Question

Name *