Coates IT & Network Solutions

  • Increase font size
  • Default font size
  • Decrease font size
Home Managed IT Services Vulnerability Scanning

Vulnerability Scanning

E-mail
Vulnerability ScanThis managed service scans and reports on over 2,000 vulnerabilities across hardware and software configurations to determine if devices are vulnerable to outside attack – be it “backdoor”, viruses, old software or misconfiguration errors. We will run weekly or on-demand vulnerability scans to check for threats related to account information (e.g. expired accounts, default passwords); CGI scripts; e-commerce; DNS; DoS; FTP; IP; Mail; NetBIOS; Registry; Remote Access; RPC; Service Control; SSH; and Web Servers.

REPORTS
  • Vulnerabilities by device
  • Vulnerabilities by scan type
  • Vulnerabilities by audit
  • Discovered ports
  • Windows processes, services, and shares
  • Discovered users
 

Think About This...


Disasters can come in many forms and they can happen when you least expect it. Only 6% of companies that suffer catastrophic data loss survive while 43% never reopen and 51% close within 2 years of the disaster. 93% of the companies that did not have their data backed up in the event of a disaster went out of business. [Best's Underwriting Guide]

Polls

How often do you backup your data?