Security Risk Analysis & Vulnerability Assessments

Beyond identifying data at-risk, VRB Network Consulting Risk Assessments point out the vulnerabilities that could lead to a data breach. Whether your company’s biggest risks come from email or from malicious web downloads, VRB Network Consulting Risk Assessments will help you tighten your security where you need it most.

Key Features:

Permissions Discovery

Ensure that only authorized individuals can access sensitive data.

This includes:

  • Inappropriate permission discovery
  • Support for multiple file types
  • Granular permission scans
  • Information on leaked or stolen data

Personally Identifiable Information (PII) Discovery

Safeguard sensitive personal data from attack.

This includes:

  • Personally identifiable information discovery
  • Payment data discovery
  • Deep scans in hard-to-find persistent storage
  • Customizable scans

Vulnerability Scanning 

Locate Security Holes in Your Systems.

This includes:

  • Host-based scanning
  • Lightweight scans
  • Emerging threat discovery
  • Cross-device search
  • Identify unpatched software
  • E-mail
  • Mac and Windows operating systems vulnerabilities
  • Threats from VPN connections

Payment Data Discovery

Protect credit card data and help ensure PCI DSS compliance.

This includes:

  • PCI DSS required scans
  • Multiple supported device types
  • Encryption for data-in-transit and data-at-rest
  • Extensive file types for multiple technologies
  • Cross-platform compatibility

Risk Analysis and Vulnerability Reports

View reports on the potential financial impact of your at-risk data.

This includes:

  • Credit card data discovery
  • Establishing a data breach risk baseline
  • Vulnerability trend report
  • Data breach risk trend report
  • Per-device breakdowns of insecure data

Please use the “Help Desk Portal” on the Contact page to ask for more information or to schedule a consultation.