A vulnerability assessment is a test that evaluates servers, workstations, and networking infrastructure with the primary goal of identifying vulnerabilities that pose a security risk. This can be done externally, against targets facing the internet, or internally against a more comprehensive set of business assets. A vulnerability assessment is designed to assess a set of hosts - looking for open ports and their associated services to identify vulnerable operating systems, software, and configurations.
CBTS uses industry leading tools to perform our vulnerability assessments. Our vulnerability assessments involve two parts: identification and validation. Once vulnerabilities are identified they are analyzed and evaluated to ensure accuracy of findings while reducing the number of discoveries to those that are actually valid. The final portion of our vulnerability assessments is a customized report tailored to each client’s needs.
CBTS ReportingCBTS provides a detailed, customized report for our engagements. We provide a concise report that focuses on the actionable findings that are prioritized by severity along with associated recommendations for improvement. Every CBTS Information Security report contains the technical detail for Operations to understand and remediate plus a high level executive summary to effectively communicate the results to leadership. With CBTS security, you will have experts available to discuss all areas addressed and the specifics of each finding with you and your team to ensure you get the most out of our collaborative effort.
CBTS works on being our "partner" - going out their way to be accommodating to all of our requests. They’re always available to work with our management and technical teams to answer their questions. Their security assessments are developed for both management as well as technical teams. The detailed recommendations are extremely valuable as well.
Rick Grubbs - Sr. Director, Managed Cloud, itelligence