Managed vulnerability management

The aim of this service is to assess the threat and vulnerability of the computer network. It not only carries out scans, but also provides support for vulnerability management and remediation.

  • Technical aspect
  • Managerial aspect
  • Financial aspects
  • Data synchronised with your ITSM or ticketing tool.
  • No need for another portal!
  • Reports are customised according to your internal processes.
  • Reports for technical staff and managers.
  • Continuous monitoring of risks.
  • Support for remediation measures.
  • A scanner with no impact on your network.
  • Agents with no impact on system performance.
  • Simplified paperwork.
  • Regular evaluation of our service performance according to jointly defined criteria.
  • Monitoring of vulnerability management progress.
  • A separate report will give you an overview.
  • Three-month trial (PoC) 100% reimbursed.
  • No minimum contract period.
  • No additional costs (support, frequency of scans, etc.).
  • Price unchanged since 2019.
  • No minimum order quantity (10, 1000 or 5000 IPs).

How does it work?

The vulnerability management process is simple:
It consists of a ‘Build’ phase and a ‘Run’ phase.

    flowchart TD
	    A[Build] --> B(Run)
	    B -- Client feedback --> C{Changes needed?}
	    C -- No --> B
	    C -- Yes --> A
	    B -- Every X months --> A
  • The ‘Build’ phase consists of defining the scope of the service together.
  • The ‘Run’ phase consists of the scan itself, the discovery of vulnerabilities, their prioritisation and remediation.
    • Unless customer feedback requires a change, the ‘Run’ phase continues until it is reassessed at the frequency defined with the customer.

The ‘Build’ phase is re-evaluated at a defined frequency to take into account new aspects of the network. It is also possible to re-evaluate the ‘Build’ phase more frequently thanks to automation.

Info

All our services are designed to accommodate people with disabilities.