Brief Introduction 

Network environments and network activities are becoming more and more diverse. Many known vulnerabilities have high-risk loophole threats due to problems such as improper website configuration settings, encrypted connection settings or security settings by enterprises, and may give hackers opportunities for attacks. In order to reduce information security risks and fully understand and grasp the security vulnerabilities that exist for websites, a website vulnerability scan service is used to scan target websites, and information security experts will perform professional analyses, then propose effective and feasible improvement plans to strengthen and patch the vulnerabilities. After the vulnerabilities are corrected, they will be tested again for verification. Comparative analysis will be performed to discover security vulnerabilities and repair them effectively in time, reduce the chance of being attacked significantly, and avoid the risk of the enterprise being intruded.

 Description 

A security vulnerability scan is performed on the various target websites. Vulnerability scan tools are used together with other commonly used tools and instructions according to standardized operating procedures to scan the various web applications to check whether security vulnerabilities exist. Effective and feasible repair recommendations can be proposed by checking and comparing the information and performing professional analysis. After the vulnerabilities of enterprises are repaired, they are re-tested for verification to confirm the effectiveness of the vulnerability repairs to reduce information security risks.

 Benefits 

·     Professional testing team: The testing team has several international information security certifications, and has rich experience in information security, able to grasp vulnerability problems effectively.

·    Standardized operating procedures: Quick and effective service quality is provided by following the standardized testing operating procedures set.

·    Professional vulnerability analysis and recommendations: Different aspects of statistical data analysis reports are provided, then complete and feasible repair recommendations are proposed according to the vulnerabilities discovered.

·    Customized test plans: Requirement interviews are performed before testing to formulate testing plans and create the best testing solution.

·    Expert consultation: Professional vulnerability repair consultation with quick responses and feedback provides effective solutions and evaluations as the basis for management.

 Applicable Objects 

Agencies, financial units, enterprises, web service providers of enterprises, and web application developers where the Cyber Security Management Act can be applied.

 Service process 

 Contact window 

ContactMe.Sec@hwacom.com

 

 Understand other related testing services 

 System vulnerability scan service  Penetration test service   Source code inspection service