For full functionality of this site it is necessary to enable JavaScript. Here are the instructions how to enable JavaScript in your web browser.


Not a member yet? Register now and get started.

lock and key

Sign in to your account.

Account Login

Vulnerability Scanning

Custodis IT Vulnerability Assessment provides a quick glance of the security posture of your systems and applications. Due to the changing nature of the security landscape and your business requirements, it is recommended that such assessments be conducted frequently (especially in between Penetration Tests) to continuously monitor existing threats.

Custodis IT experts scan your systems and applications for vulnerabilities, which are potentially susceptible to exploitation, on a recurring basis.

Vulnerability assessments can have a specific focus:

  • Network – With this assessment, we focus on hosts within a network including devices that are connected to find weaknesses.
  • Web Application – This assessment includes testing the OWASP top 10 vulnerabilities, and the application as both an unauthorized or authorized user.
  • Virtual Platform – Virtual environments have exploded onto the scene in recent years and bring some unique challenges. This assessment checks your virtual environment and its host configurations to ensure they comply with security best practices.
  • SQL Database – Databases contain some of the most sensitive data within an organization. Shearwater Ethical Hacking will deploy software to test the sensitivity of your database contents as well as check the security settings within the Systems.
  • PCI ASV – We can provide compliance scanning of Internet facing resources, as well as internal vulnerability scans, which address the Payment Card Industry Data Security Standard (PCI DSS) requirements.
  • Wireless – We test for the presence and security level of wireless access points and detect unauthorized wireless access points.

Our program covers a vast range of vulnerabilities, protocols, applications, operating systems and other services to continuously discover, at minimum, all known vulnerabilities, providing more accurate results and thereby excluding false positive and false negative findings.
Our Security Consultants perform environmental scoping and assessment and provide detailed reports, follow up advice and assistance in understanding, prioritizing and mitigating risks.

Custodis IT analyses the findings and reports potential issues and their impact, together with prioritized recommendations for improvement, bearing in mind your specific context and the role of systems and applications and their importance to your organization.

Do not hesitate and CONTACT US today for more information or call +31 (0)365 389 322.