Security Risk Analysis & Vulnerability Assessments
Beyond identifying data at-risk, VRB Network Consulting Risk Assessments point out the vulnerabilities that could lead to a data breach. Whether your company’s biggest risks come from email or from malicious web downloads, VRB Network Consulting Risk Assessments will help you tighten your security where you need it most.
Key Features:
Permissions Discovery
Ensure that only authorized individuals can access sensitive data.
This includes:
- Inappropriate permission discovery
- Support for multiple file types
- Granular permission scans
- Information on leaked or stolen data
Personally Identifiable Information (PII) Discovery
Safeguard sensitive personal data from attack.
This includes:
- Personally identifiable information discovery
- Payment data discovery
- Deep scans in hard-to-find persistent storage
- Customizable scans
Vulnerability Scanning
Locate Security Holes in Your Systems.
This includes:
- Host-based scanning
- Lightweight scans
- Emerging threat discovery
- Cross-device search
- Identify unpatched software
- Mac and Windows operating systems vulnerabilities
- Threats from VPN connections
Payment Data Discovery
Protect credit card data and help ensure PCI DSS compliance.
This includes:
- PCI DSS required scans
- Multiple supported device types
- Encryption for data-in-transit and data-at-rest
- Extensive file types for multiple technologies
- Cross-platform compatibility
Risk Analysis and Vulnerability Reports
View reports on the potential financial impact of your at-risk data.
This includes:
- Credit card data discovery
- Establishing a data breach risk baseline
- Vulnerability trend report
- Data breach risk trend report
- Per-device breakdowns of insecure data
Please use the “Help Desk Portal” on the Contact page to ask for more information or to schedule a consultation.