January 14, 2016 covenant

Covenant Now Offers ON DEMAND Security Vulnerability Assessments.

Vulnerability Assessment Service

Simple, fast i.e 7-10 business days, to provide actionable information one of your growing risk: Cyber.

Vulnerability Assessment Definition

A vulnerability assessment is a process that identifies, quantifies, and prioritizes (i.e., by the creation of a hierarchy) the vulnerabilities in an environment.

Our Vulnerability Assessment Service Identifies Your Security Weaknesses

Attackers gain access to and exploit your environment through vulnerabilities that exist across your systems and applications. Your risk exposure is heightened due to the fact that Internet connected applications and systems hold data that have an inherent monetary value.

  • In 2013, 400 million credit card numbers, social security numbers, and other personal information were stolen1.
  • Average cost of a US Data Breach: $5.4 million.
  • Cost to US companies: $188 per compromised data record2.

Personally Identifiable Information (PII) such as birthdates and social security numbers, customer and client contact information, employee healthcare data, company plans and designs, intellectual property and competitive business information, and credit card numbers are easily converted to money by cyber criminals. These intruders are determined to obtain all data with a “street value” greater than the penalty they face if caught. A vulnerability assessment can help you understand where your protection is deficient and allow you to begin proactively eliminating intrusion opportunities.

The Covenant Security Solutions Vulnerability Assessment Service will illuminate defects within your network that can be utilized by attackers. Our certified security engineers will assess your organization’s susceptibilities by employing the best commercial and publically available tools as well as manual techniques. As risk assessment professionals, our experienced experts provide information assurance and security services to both private and public entities including the most highly classified operational systems within the Federal Government. While custom options are available, in general, our vulnerability assessment will evaluate your firewalls, routers, web servers, databases, and network connected devices.

What Our Vulnerability Assessment Service Will Do For You

Provide A Network Security Evaluation

Help your organization by testing for and discovering vulnerabilities and network security gaps combined with recommendations that will allow you to take specific steps to improve your security posture.

Answer Your Most Important Security Questions
  • “What information security weaknesses do we have?”
  • “How can we address our information security liabilities?”
  • “What should we remediate first?”
  • “Which issues are the most critical?”
Test Your External And Internal Assets

Externally testing your environment will reveal vulnerabilities exploitable by an attacker outside of your organization attempting to break in. Internal testing will expose vulnerabilities within the systems, applications, and network infrastructure that reside behind your trust barrier.

Help You Meet Your Compliance Requirements

Our Vulnerability Assessment Service can help your organization meet periodic compliance requirements by scanning your environment for vulnerabilities and providing a list of remediation objectives.


Other Services You May Be Interested In

  • Risk Assessments
  • Security Engineering
  • Information Security Training
  • Cyber Operations Support

1Cenzic 2014 Application Vulnerability Trends Report
2Poneman Institute 2013 Cost of Data Breach Study: Global Analysis