CLOSE

Alok Sahay Country Manager India Saarc

Alok Sahay,
Sales Director, India
alok.sahay@holmsecurity.com
+91 8800-67 77 99

Welcome to India!

Hi! My name is Alok and I'm your local representative in India. Looking for a cyber security solution and vulnerability management? Let's talk! 

View products

Book demo

CLOSE

Faurani Ahmad Sales director Southeast Asia

Ahmad Faurani
Sales Director, Southeast Asia
ahmad.faurani@holmsecurity.com
+60 19 434 2727

Welcome to Malaysia!

Hi! My name is Ahmad Faurani and I'm your local representative in Malaysia. Looking for a cyber security solution and vulnerability management? Let's talk! 

View products

Book demo

CLOSE

cristian-miranda-holm-security

Cristian Miranda
Key Account Manager, Finland
cristian.miranda@holmsecurity.com
+46 8-550 05 582

Tervetuloa Suomeen!

Hei! Nimeni on Cristian Miranda ja olen paikallinen edustajasi Suomessa. Etsitkö tietoturvaratkaisua ja haavoittuvuuksien hallintaa? Puhutaan!

Lue lisää

Kirjaesittely

CLOSE

victor-bunge-meyer-holm-security

Victor Bunge Meyer
Key Account Manager, Sverige
victor.bunge-meyer@holmsecurity.com
+46 08-550 05 582

Holm Security i Sverige

Välkommen till Holm Security i Sverige! Jag heter Victor och är din lokala kontakt. Kontakta mig om du vill veta mera om vårt system eller sårbarhetsanalyser. 

Läs mer här

Boka demo

CLOSE

Beth Murrell holm security

Beth Murrell
Sales Development Representative, Benelux
elizabeth.murrell@holmsecurity.com
+31-20-238 63 94

Welkom in de Benelux!

Mijn naam is Beth Murrell en ik ben uw lokale vertegenwoordiger in Nederland, België en Luxemburg. Op zoek naar een cyberveiligheidsoplossing en kwetsbaarheidsbeheer? Laten we praten!

Lees verder

Boek een demo

CLOSE

jens dahlkvist holm security

Jens Dahlkvist
Key Account Manager, Norge
jens.dahlkvist@holmsecurity.com
+46 8-550 05 582

Holm Security i Norge

Velkommen til Holm Security i Sverige! Jeg heter Victor og er din lokale kontaktperson. Kontakt meg hvis du vil vite mer om systemet vårt eller sårbarhetsanalyser.

Les mer

Personlig demo

What is vulnerability assessment?

Image of Stefan Thelberg
Stefan Thelberg

January 31, 2021

Vulnerability assessment or vulnerability management can be described as looking for unlocked doors, bad code, open ports, or holes in a system’s security system. After finding potential problems, the assessment can help the user decide what actions to take.

What is it?

Some methods of testing a network or system for vulnerabilities include pentesting and intrusion testing, file system scans, server scans, compatibility checks for software running on the system and the latest security services, and much more.

Pentesting and intrusion testing utilize software platforms that are built to scan and identify network issues. These issues could be anything from open ports which would allow a hacker access to the system, back doors that have been left behind by previous visits from a hacker or a piece of malware, weak passwords that can be easily hacked via brute force, and errors that could potentially leave a system at risk.

Another aspect of vulnerability assessment is checking the file systems on a network. There are file systems on the local hard drives of the machines as well as on the servers themselves. If the file system is disorganized and has a lot of errors within it, there is a very good chance that if the system became compromised, and the administrator of that system would not be able to catch the problem before real damage or theft occurs.

The apps on the server, on the machines connected to the network, and the web apps which are accessed by those machines also need to be checked by the person or company carrying out the vulnerability assessment. In a similar fashion to the file system, if apps become too old they lose their compatibility with security tools and can become infected by all kinds of threats. The vulnerability test should point out which programs need to be updated to include the latest virus and malicious software definitions. This step may seem like common sense, but one aspect of the app world that many people do not take into consideration is that for each app, an entirely new set of rules and permissions are granted to the creators of those programs. For that reason, it is very important to keep a close eye on what is going on with each and every tool that is being used on the system.

Vulnerability tests usually work by running an IP or website address through a database and the testing software will cross reference that information with databases of known threats. While there are free and open-source solutions for vulnerability testing, such as Subgraph Vega, we find that companies who are experts in the field do a better job with the actual assessment. Here at Holm Security we take care of all the tedious and time-consuming work involved.

Conclusion

The most effective method of keeping your system safe is to run a vulnerability test regularly, and to keep a close watch on any irregularities that come up. By doing this simple step, it is relatively simple to keep your system safe and secure.

Cyber Security Starts Here! 👇

Vulnerability assessment or vulnerability management is a cornerstone in a modern cyber security defense. We love to tell you more!

Book demo now!

screen-shot-holm-security