Vulnerability Scanning Service

ASA’s vulnerability scanning service is a proactive approach to identifying vulnerabilities in your systems and network. Risks to organizations often include misconfigured firewalls, exploitable system configurations, out of date and unpatched software and unencrypted login credentials.

ASA uses two types of vulnerability scanning methods: An internal credentialed scan and external non credentialed scan. In the internal credentialed scan method, ASA logs in as an authenticated network user and reveals the vulnerabilities that are accessible to a trusted user, or to an intruder that had gained access as a trusted user.

In the external non credentialed scan method, ASA performs the scan as an unauthenticated attacker would, without credentialed access to the network. This scan reveals vulnerabilities and misconfigurations that could possibly be accessed without logging into the client network.

ASA's Vulnerability Scanning Service does not include penetration testing. For more information about ASA's vulnerability scanning, please contact the Security Operations Center.

Image
Vulnerability Scanning Image