Telivy
Telivy
Telivy
Telivy
Telivy
Telivy
Telivy
Telivy

External Assessments

Scan For External Threats

Telivy External Scans

An external security scan is a test of your organization's public-facing systems and networks for security vulnerabilities. Imagine that your organization is a castle. An external security scan is like walking around the outside of the castle and looking for any weak points, such as unlocked doors, broken windows, or hidden tunnels. By identifying and fixing these weak points, you can make it more difficult for attackers to break into your castle.

It is performed from the outside, simulating the perspective of an attacker. External security scans can identify a wide range of vulnerabilities and misconfigurations. Below is a summary of different areas of the assessment:

External Vulnerabilities

Network Security

In this section we scan the publicly accessible services like your websites, external IPs or endpoints that can accessible via the public internet. Telivy parses your DNS and uses a network mapper to scan these endpoints to infer the existing vulnerabilities.

The platform then classifies these vulnerabilities as a Low, Medium and High Severity vulnerabilities. Note that these classification are based on the NVE database maintained by the federal government.

Image alt text
Image alt text
Last Updated On 2024-03-07
Was this page helpful?
Last Updated On 2024-03-07
Was this page helpful?

External Assessments

Scan For External Threats

Telivy External Scans

An external security scan is a test of your organization's public-facing systems and networks for security vulnerabilities. Imagine that your organization is a castle. An external security scan is like walking around the outside of the castle and looking for any weak points, such as unlocked doors, broken windows, or hidden tunnels. By identifying and fixing these weak points, you can make it more difficult for attackers to break into your castle.

It is performed from the outside, simulating the perspective of an attacker. External security scans can identify a wide range of vulnerabilities and misconfigurations. Below is a summary of different areas of the assessment:

External Vulnerabilities

Network Security

In this section we scan the publicly accessible services like your websites, external IPs or endpoints that can accessible via the public internet. Telivy parses your DNS and uses a network mapper to scan these endpoints to infer the existing vulnerabilities.

The platform then classifies these vulnerabilities as a Low, Medium and High Severity vulnerabilities. Note that these classification are based on the NVE database maintained by the federal government.

Image alt text
Image alt text
Last Updated On 2024-03-07}
Was this page helpful?
Last Updated On 2024-03-07}
Was this page helpful?

External Assessments

Scan For External Threats

Telivy External Scans

An external security scan is a test of your organization's public-facing systems and networks for security vulnerabilities. Imagine that your organization is a castle. An external security scan is like walking around the outside of the castle and looking for any weak points, such as unlocked doors, broken windows, or hidden tunnels. By identifying and fixing these weak points, you can make it more difficult for attackers to break into your castle.

It is performed from the outside, simulating the perspective of an attacker. External security scans can identify a wide range of vulnerabilities and misconfigurations. Below is a summary of different areas of the assessment:

External Vulnerabilities

Network Security

In this section we scan the publicly accessible services like your websites, external IPs or endpoints that can accessible via the public internet. Telivy parses your DNS and uses a network mapper to scan these endpoints to infer the existing vulnerabilities.

The platform then classifies these vulnerabilities as a Low, Medium and High Severity vulnerabilities. Note that these classification are based on the NVE database maintained by the federal government.

Image alt text
Image alt text
Last Updated On 2024-03-07
Was this page helpful?
Last Updated On 2024-03-07
Was this page helpful?
ON THIS PAGE
Telivy External Scans
External Vulnerabilities
Network Security
Back to top