Due to increasing complexity of network activities, most hackers utilize known system vulnerabilities to write exploit codes and invade information systems of enterprises. -Moreover, the inappropriate configuration or outdated software patch could lead the host environment in the enterprise is usually subjected to unauthorized access or at risk of other security threats. Through system vulnerabilities scanning, discover the weakness of maintenance & operation and website security early. So we can provide remediation work to prevent intrusion and attack.
The expert team of Acer Cyber Security Inc. (ACSI) provides customers with system vulnerability scanning and result evaluation services based on extensive professional experiences in conjunction with internationally renowned system vulnerability scan tools. Through system vulnerabilities scanning, discover the weakness of maintenance & operation and website security early. So we can provide remediation work to prevent intrusion and attack.
Service Description
service items |
Description |
Product content |
Detection Function |
-
Detection of security issues for host operating systems, network equipments, and more common software packages (such as database etc.) on the market
-
Quick update of vulnerability database within 48 hours
-
Web security check on if SSL is used or SQL information is exposed
|
Detection Approach |
-
Remote or field scan detection regularly
-
Use non-intrusive approach to exclude intrusion type detection, such as DDoS type, denial of service and other attack tests
-
Plug-in, help to simplify writing new plug-in program, making vulnerability scanning service more efficient
|
Detection Report |
-
Support scan report in Chinese, which may provide recommendations and descriptions for vulnerability patching in both Chinese and English
-
In addition to use tool vulnerability database, we also apply extensive experience to reduce error rate
-
Simplification of operating procedures for asset managers based on categorization of asset groups
-
Scan approaches and results, top ten vulnerable hosts, top ten vulnerabilities and patching recommendations
-
High-risk host ranking, vulnerability ranking, top ten distributions of vulnerabilities at different levels, and patching recommendations and so forth
|
Expected Benefits
-
Obtaining professional security vulnerability detection report regularly, serve as the base for formulating security policy
-
Capable to conduct vulnerabilities remediation for host systems immediately
-
Ensuring non-disclosure of personal information
-
Reducing risk, compliance with regulatory audit requirement
-
Creating effective active anti-hacking security mechanism
Executive flow chart