Vulnerability Management
Vulnerability Management as a Service. Per asset
Web scan
Scan your Content Management System or web application
ID Control's many scanners give you the option to check your websites and web applications for security holes. Our scanners support the most common Content Management Systems.
The following Content Management Systems are supported:
- WordPress
- Drupal
- Joomla
- Sharepoint
Also scan your web server for misconfigurations such as:
- Server software leaks
- Missing security headers
- Outdated JavaScript
- Insufficiently protected files
Also set up a periodic scan so that you are immediately informed if a vulnerability is discovered
Infra scan
We offer the following infrastructure scans:
- Network Vulnerability Scan
Our vulnerability scanner recognizes more than 57,000 vulnerabilities and is continuously updated. The network vulnerability scan has the following options: - Protocol type (TCP of UDP)
- Scan type: Light of Full
- Check if host is online
- Port Scan type (most common, port range, port list)
- TCP or UDP port scans
The TCP or UDP port scans are ideal for gaining a quick insight into what is open in your network. - SSL/TLS scan
Check your server for common vulnerabilities that could undermine your encryption. - VirtualHost scan
With the virtualhost scan you can easily check which virtualhosts are active on a server. This allows you to check that nothing is running that doesn't need to be.
Je dynamische Snippet wordt hier weergegeven...
Dit bericht wordt weergegeven omdat je niet zowel een filter als een sjabloon hebt opgegeven om te gebruiken.