-
Standard Vulnerability Assessment Service
-
Premium Vulnerability Assessment Service
-
Enterprise Vulnerability Assessment Service
Standard Vulnerability Assessment Service |
Premium Vulnerability Assessment Service |
Enterprise Vulnerability Assessment Service |
||||
|---|---|---|---|---|---|---|
| Vulnerability scanning on networks and applications to detect security flaws | ||||||
| Vulnerability scanning on networks and applications to detect security flaws | 1 per year | 4 per year | 12 per year | |||
| Classification of vulnerabilities by severity | ||||||
| Classification of vulnerabilities by severity |
![]() |
![]() |
![]() |
|||
| Configuration assessment to identify errors or inefficiencies | ||||||
| Configuration assessment to identify errors or inefficiencies |
![]() |
![]() |
![]() |
|||
| Report with detected vulnerabilities and explanatory details | ||||||
| Report with detected vulnerabilities and explanatory details |
![]() |
![]() |
![]() |
|||
| Recommendations for resolving or mitigating issues | ||||||
| Recommendations for resolving or mitigating issues |
![]() |
![]() |
![]() |
|||
| General suggestions for improving overall security | ||||||
| General suggestions for improving overall security |
![]() |
![]() |
![]() |
|||
| Advanced report with severity classification to define priority vulnerabilities and focus on critical issues | ||||||
| Advanced report with severity classification to define priority vulnerabilities and focus on critical issues |
![]() |
![]() |
![]() |
|||
| Targeted consulting to discuss results and recommendations | ||||||
| Targeted consulting to discuss results and recommendations |
![]() |
![]() |
![]() |
|||
| Customized solutions to improve business security and address the most urgent vulnerabilities | ||||||
| Customized solutions to improve business security and address the most urgent vulnerabilities |
![]() |
![]() |
![]() |
|||
| Rapid consulting with an expert team to resolve critical vulnerabilities or for urgent interventions | ||||||
| Rapid consulting with an expert team to resolve critical vulnerabilities or for urgent interventions |
![]() |
![]() |
![]() |
|||
| Advanced strategies to minimize risks and strengthen security | ||||||
| Advanced strategies to minimize risks and strengthen security |
![]() |
![]() |
![]() |
|||
| Proactive support to prevent threats with continuous consulting | ||||||
| Proactive support to prevent threats with continuous consulting |
![]() |
![]() |
![]() |
|||
| Scopri di più | Scopri di più | Scopri di più | ||||

