Back to top

Internal and External Vulnerability Assessments

Logically's internal and external vulnerability assessments help identifiy vulnerabilities both inside and outside of an organization's network and also provide ongoing guidance as exploits evolve and new vulnerabilities emerge.

Internal Vulnerability Assessments (IVA)

An internal vulnerability assessment identifies vulnerabilities currently within the client’s IT infrastructure and provides a remediation plan for those vulnerabilities, ranked based on threat. This comprehensive assessment includes a review of existing technical vulnerabilities to help organizations build a security roadmap. Logically performs all scans by deploying a scanner appliance within the network.

Benefits of an IVA:

  • Identifies known vulnerabilities within an environment so that a malicious entity cannot use them to cause harm
  • Provides remediations steps for discovered vulnerabilities to help you secure your environment
  • Defines current risk within your environment and prioritizes where emphasis should be placed to best reduce risk
  • Meets compliance requirements. Multiple compliance frameworks (such as ISO, HIPAA, PCI-DSS, and NIST) require vulnerability scans to be completed.

Perhaps the most appealing benefit is a cost savings. Expensive data breaches are less likely to occur by reducing risk in your environment.

External Vulnerability Assessments (EVA)

An EVA follows the same process that an IVA does. It looks at the vulnerabilities currently present within a client’s publicly facing network and provides a remediation plan based upon risk. The key difference is that an EVA focuses on the threats that could be used to penetrate an environment as opposed to those threats that require access into an environment to begin with. Logically performs the EVA utilizing its cloud-hosted scanner appliance.

Benefits of an EVA:

  • Identifies known threats that attempt to penetrate your environment so that a malicious entity cannot use them to cause harm
  • Provides remediations steps for discovered vulnerabilities to help you secure your environment
  • Upon completion of the scanning process, Logically will provide reports highlighting key areas of risk, vulnerabilities discovered, and the remediation steps that should be followed to mitigate the identified risks.

The provided reports are risk prioritized to detail which actions should be taken first to better secure your environment based on the likelihood a discovered vulnerability would be utilized to negatively impact business. These reports help you decide where to best invest your time and resources when hardening your environment.