We obtain an inventory of your IT infrastructure including critical assets and spend some time learning about your network.
Our plans are discussed and coordinated with you onsite staff.
The latest threat data pulled from applicable repositories.
Black lists or other preferences requested are implemented. Our scans are scheduled for the time and date that has been approved.
We review scan results for the most severe and critical vulnerabilities that also have clear indicators of threats.
The details of the results are provided and discussed.
We collaborate with you to understand your priorities and what we can do to help next.
We act upon our joint-action plan - implementing security technologies, processes, or coordinating other remediation activities.
Re-testing of the control environment.
Ask how SSVM can help you reduce risk and protect critical data.