{"id":467,"date":"2020-11-04T23:06:20","date_gmt":"2020-11-05T04:06:20","guid":{"rendered":"https:\/\/globetech.biz\/?page_id=467"},"modified":"2023-10-02T13:54:46","modified_gmt":"2023-10-02T18:54:46","slug":"external-vulnerability-scanning","status":"publish","type":"page","link":"https:\/\/globetech.biz\/index.php\/professional-services\/external-vulnerability-scanning\/","title":{"rendered":"External Vulnerability Scanning"},"content":{"rendered":"\n<p class=\"has-text-align-center has-ast-global-color-4-color has-ast-global-color-1-background-color has-text-color has-background has-medium-font-size\"><strong>For a lot of companies, hardening their security will mean assessing their perimeter defense. GlobeTech LLC can audit the attack surface of an organization&#8217;s externally facing assets to review the risks and vulnerabilities that an attacker would take advantage of. <\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/nasa-Q1p7bh3SHj8-unsplash.jpg\" alt=\"\" class=\"wp-image-535\" style=\"width:480px;height:320px\" width=\"480\" height=\"320\" srcset=\"https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/nasa-Q1p7bh3SHj8-unsplash.jpg 640w, https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/nasa-Q1p7bh3SHj8-unsplash-300x200.jpg 300w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-accent-color has-ast-global-color-4-background-color has-text-color has-background\">The External Attack Surface<\/h2>\n\n\n\n<p class=\"has-text-align-center\">The Companies internet facing footprint is assessed by reviewing any available public information and correlating it back to your systems. For example, benign information like public DNS records might shed light into the operations that are exposed and available to an attacker. This type of Discovery and Reconnaissance begin the engagement. <\/p>\n\n\n\n<p class=\"has-text-align-center\">Discovered assets will be scanned for vulnerabilities and assessed for risk or impact. The Vulnerability assessment becomes one of the report deliverables at the end of an external engagement. <\/p>\n\n\n\n<p class=\"has-text-align-center\">Each potential attack vector is reviewed and pen tested to attempt to gain access to the systems. By combining various sources of public information along with vulnerability assessments, exploitation of external systems can be more fully assessed.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"426\" data-id=\"539\" src=\"https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/analytics-3088958_640-1-e1605667629804.jpg\" alt=\"\" class=\"wp-image-539\" srcset=\"https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/analytics-3088958_640-1-e1605667629804.jpg 640w, https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/analytics-3088958_640-1-e1605667629804-300x200.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"426\" data-id=\"537\" src=\"https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/police-2070772_640.jpg\" alt=\"\" class=\"wp-image-537\" srcset=\"https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/police-2070772_640.jpg 640w, https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/police-2070772_640-300x200.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"426\" data-id=\"538\" src=\"https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/analytics-3088958_640.jpg\" alt=\"\" class=\"wp-image-538\" srcset=\"https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/analytics-3088958_640.jpg 640w, https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/analytics-3088958_640-300x200.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n<\/figure>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-accent-color has-ast-global-color-4-background-color has-text-color has-background\">External Vulnerability Assessment Reporting<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>The reporting is the most important part of the assessment. This is what provides value to your business. Each independently reported vulnerable system or scenario is highlighted with a severity score, general attack narrative or description, Proof of Concept code or commands, and mitigation recommendations.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>The External Assessment comes with Vulnerability Scan Reports as well as supporting discovery data and manual Penetration Testing of exposed assets. While GlobeTech LLC will make recommendations, the business ultimately decides what the right option is for them, so together we\u2019ll spend time determining the actions that are right for you.<\/p>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-accent-color has-ast-global-color-6-background-color has-text-color has-background\">Contact<\/h2>\n\n\n\n<p class=\"has-text-align-center\">For more information, feel free to fill out the<strong>\u00a0<a href=\"https:\/\/globetech.biz\/index.php\/contact\/\">contact form<\/a>\u00a0<\/strong>where GlobeTech LLC can respond and schedule a discovery call.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For a lot of companies, hardening their security will mean assessing their perimeter defense. GlobeTech LLC can audit the attack surface of an organization&#8217;s externally facing assets to review the risks and vulnerabilities that an attacker would take advantage of. The External Attack Surface The Companies internet facing footprint is assessed by reviewing any available [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":389,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-467","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/pages\/467","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/comments?post=467"}],"version-history":[{"count":10,"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/pages\/467\/revisions"}],"predecessor-version":[{"id":1043,"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/pages\/467\/revisions\/1043"}],"up":[{"embeddable":true,"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/pages\/389"}],"wp:attachment":[{"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/media?parent=467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}