Vulnerability Scanning

Our vulnerability scanning service runs against your networked hosts. The resulting report highlights any critical outstanding patches or configuration errors that need attention, and acts as a gap analysis for PCI compliance.

We’ll schedule scans to be sent to you so you have sight of, and can therefore manage, any outstanding issues. Our team acts as an extension of yours, and we can advise on false positives and remediation if you need. What’s more, ad hoc scanning, checking for zero day exploits, are available for extra peace of mind.

Is it right for me?

In some cases, ignorance is not bliss. In our world of increasing cyber-attacks, it is much better that you find your vulnerabilities before an attacker does.

Our vulnerability scanning is your roaming security guard, inspecting your network and highlighting any areas of risk before they become subject to attack. It reports on your outstanding vulnerability footprint, and is particularly useful in monitoring compliance, for example PCI DSS, issues or risks. What’s more, you are able to ensure that your patch management procedures are working and check for configuration issues.

The Bunker’s Vulnerability Scanning Service, with full reporting and consultancy, for remediation and compliance.

Why choose The Bunker?

The Bunker’s service is based on years of experience in the security field, and we understanding the importance of awareness and when it comes to your vulnerabilities. We can scan both externally and internally to produce a report on the state of your network, lighting the first warning beacon which alerts your team.

If you are one of our managed services or colocation customers at The Bunker, we can scan behind your border firewall to produce an internal view of your environment- a deeper, and more revealing, dive into your hosts and networking.

Should you require help you have our team to hand; we can advise on false positives and will assist remediation of any critical vulnerabilities.

How Vulnerability Scanning works

With your written permission we will externally scan your network range for vulnerabilities. If you so desire we will plug into your network behind your border firewall for an internal scan. You’ll then get a clearly formatted report, at which point we can aid with further consultancy in identifying false positives and remediating any critical issues facing your environment.

This is a service which can be used on an ad-hoc basis, or scheduled in at a regular time period that suits you and which gives you peace of mind. Should you require these as an on-going service, we can set up an agent that sits in your network and reports to a central reporting server.

Our Accreditations

  • ISO 27001
  • First
  • G-Cloud Accredited
  • ITIL Service Management
  • Microsoft Gold Partner
  • NHS IGSoC Approved
  • RIPE NCC Member
  • Tech UK
  • Veeam Gold Cloud & Service Provider Partner
  • PCI Participating organization
  • Dell EMC Gold Partner
  • Cyber Essentials Plus
  • AWS Select Consulting Partner