The purpose of a Vulnerability Assessment is to undertake an exercise to determine the extent of vulnerability within an organisation's infrastructure components (servers, networks, desktops, applications, gateways, security appliances etc.).

Prior to any work being undertaken our Security Consultants will work with you to determine the scope of the assignment based on your business objectives and the explicit requirements of the exercise. This is to ascertain whether the vulnerability assessment is in response to a direct threat, security breach, or simply as a peace of mind check to ensure systems are healthy and in good order. Perhaps as a company you are seeking to satisfy the needs of regulatory bodies or accreditors. Whatever the need or motivation Thales can tailor a service to suit your requirements.

When the scope of the Vulnerability Assessment is agreed, a proposal is created and each proposal is tailored to your business requirements. Proposals also clearly indicate the work estimate and methodology to be undertaken.

The Vulnerability Assessment itself is undertaken using a combination of manual and automated tools and techniques. Professional and experienced Security Consultants will undertake analysis of the target infrastructure and its components in order to determine the existence of and the extent of vulnerability. The findings of the testing are normalised using against good practice, your risk appetite, your business security objectives and requirements and the assets location and criticality (context analysis). All vulnerabilities are then categorised against a criteria of Criticality, Exploitability, Impact and Probability – this will draw out the real meaning to your business and provide "contextual" advice as to how this could potentially impact upon on your organisation.

The reports are tailored to meet your explicit needs and we will deliver high quality professional reports that outline clearly the vulnerabilities identified during the assessment, their potential to impact your business and importantly the report makes recommendations for risk mitigation.

The reports are designed to be relevant and readable at all levels from the CIO/Board-level to the ICT teams responsible for the Systems.

We further aim to reduce technical jargon to a minimum whilst maintaining a high-quality and usable report. In addition, we are able to provide technical briefings and security awareness training to support the improvement of systems following on from the report once delivered.