Your Questions Answered

How To Start

We have streamlined the service from start to finish.

1. Choose one of our services

Simply choose one of our packages to get started. Not sure which one is needed? Feel free to reach out!

2. Sign the ROE

The Rules of Engagement (ROE) is a legal document which says that you give us the permission to scan your devices. As soon as this is signed, we move onto the next step.

3. We start the scans

Any external scanning options will begin as soon as we confirm receipt of the signed ROE.

OSINT, explained further down the page is also performed at this stage. You’re close to the results already!

Purchased a package that allows for internal network testing as well? Sit tight, we’re already working on building and shipping out a physical appliance that you can plug into your network and begin scanning straight away. No complicated installations on machines are required!

4. Results

As soon as the scans have finished, we will be working on the reports and aiming to have them with you as soon as possible.

Here, you’ll get a full Nessus Vulnerability Scan report, as well as a detailed report which removes all of the fluff and shows you which issues should be remediated as a priority.

5. Fixing the issues

With our detailed reports, you should have no troubles fixing any identified issues. Whilst you take care of improving your security posture, we will already be configuring your next scan, and tweaking it should it be necessary. 

What We Test

Here’s an overview of just some of the devices we test

External Networks

  1. Web Server: Hosts the business website and allows online interaction.
  2. Mail Server: Manages email communications for the business.
  3. FTP Server: Enables file transfer for sharing large documents or data.
  4. Remote Desktop Server: Allows employees to access their work desktops from outside the office.
  5. VPN Gateway: Facilitates secure remote access to the company’s internal network.
  6. VoIP Server: Supports the business’s voice communication over the internet.
  7. Cloud-based Services: Services like cloud storage, collaboration tools, or customer relationship management (CRM) systems may have dedicated IPs.

Internal Networks, these can include:

  1. Workstations: Individual computers used by employees for daily tasks.
  2. Printers: Networked printers accessible to multiple users.
  3. Servers: Hosting various applications, file storage, or databases for internal use.
  4. Networked Storage Devices: Devices like Network Attached Storage (NAS) for centralized data storage.
  5. VoIP Phones: Phones that use the internet for voice communication within the organization.
  6. Router or Gateway: Manages internal network traffic and connects to the external internet.
  7. Switches: Devices that connect multiple devices within the internal network.
  8. Firewall: Provides security by controlling incoming and outgoing network traffic.
  9. Security Cameras: IP-based cameras for surveillance within the business premises.
  10. Access Points: Devices facilitating wireless connectivity within the office.

Web Applications

We perform unauthenticated web application scanning.

These tests check for common web vulnerabilities listed on OWASP.

– Broken Access Controls

– Cryptographic Failures

– Injection

– Vulnerable and Outdated Components

– And more!

Why Use NetDefenders

What makes us standout?

1. Trust

In cybersecurity, establishing trust between companies is paramount to foster effective collaboration and information sharing, enabling a united front against evolving threats and ensuring the collective resilience of interconnected digital ecosystems.

2. Customer Satisfaction

In business, prioritizing customer satisfaction hinges on providing speedy and responsive communication. With vulnerabilities that could lead to businesses going out of business,  communication is key and we aim to provide fast and accurate responses to your questions.

3. Cost

Nessus Professional, one of the leading vulnerability scanners has its licenses starting at over £4100 (as of March 2024). This cost increases annually.

The alternative Vulnerabiltiy Management services operating on individual asset licenses cost a great deal too as shown by Rapid7’s vulnerability management solution. Pricing is from $2.19 an asset per month, but you must have a minimum of 250 assets. Thats $547.5 per month starting costs… Roughly £466 per month.

Our prices are tailored for business of all sizes. Per host and per website with no minimum amount of either! Just check out our pricing table.

External Vulnerability Scans

The process for a successful external vulnerability scan

1. Scanning

The initial scan will be executed against the targets you provided in the ROE. You’ll be notified once the initial scan has started and again once it has finished.

2. OSINT

As soon as the scans have finished, we will be working on the reports and aiming to have them with you as soon as possible.

Here, you’ll get a full Nessus Vulnerability Scan report, as well as a detailed report which removes all of the fluff and shows you which issues should be remediated as a priority.

3. Fixing the issues

With our detailed reports, you should have no troubles fixing any identified issues. Whilst you take care of improving your security posture, we will already be configuring your next scan, and tweaking it should it be necessary. 

Internal Vulnerability Scans

The process for a successful internal vulnerability scan

1. Installation

We will build and ship a physical device to your office address.

An ethernet cable is provided which will need to be plugged into your router or switch, to allow internet capabilities.

2. Remote Connectivity

Kindly let us know once the device has been plugged in and powered on.

We will confirm remote connectivity. From here on out, we will manage the device and take care of the scans, so you can focus on your business.

3. Scanning

The initial scan will be executed. You’ll be notified once the initial scan has started and again once it has finished.

4. Results

As soon as the scans have finished, we will be working on the reports and aiming to have them with you as soon as possible.

Here, you’ll get a full Nessus Vulnerability Scan report, as well as a detailed report which removes all of the fluff and shows you which issues should be remediated as a priority.

5. Fixing the issues

With our detailed reports, you should have no troubles fixing any identified issues. Whilst you take care of improving your security posture, we will already be configuring your next scan, and tweaking it should it be necessary. 

Web Application Scans

The process for a successful web application scanning

1. Installation

We will build and ship a physical device to your office address.

An ethernet cable is provided which will need to be plugged into your router or switch, to allow internet capabilities.

2. Remote Connectivity

Kindly let us know once the device has been plugged in and powered on.

We will confirm remote connectivity. From here on out, we will manage the device and take care of the scans, so you can focus on your business.

3. Scanning

The initial scan will be executed. You’ll be notified once the initial scan has started and again once it has finished.

4. Results

As soon as the scans have finished, we will be working on the reports and aiming to have them with you as soon as possible.

Here, you’ll get a full Nessus Vulnerability Scan report, as well as a detailed report which removes all of the fluff and shows you which issues should be remediated as a priority.

5. Fixing the issues

With our detailed reports, you should have no troubles fixing any identified issues. Whilst you take care of improving your security posture, we will already be configuring your next scan, and tweaking it should it be necessary. 

Reach Us

Any questions, we’re here to help!

info@netdefenders.com

Leave A Message