Vulnerability management



With best-of-breed technology and specially trained Vulnerability Analysts, we survey your infrastructure, verify the results and assist the customer to understand the results. We survey your infrastructure on a fixed schedule so it is easy for you to compare results over time with the trending functionality in the solution. Whether you need Vulnerability Management for compliance or as an external expert opinion, this solution provides excellent documentation of your efforts for managing vulnerabilities.

A systematic Vulnerability Program will help you succeed to achieve compliance with various laws, regulations and standards e.g. GDPR, ISO-27001 and more.

As monitoring experts, we know that a source like Combitech Vulnerability Management feeding into your SIEM solution is an essential piece of security information. The vulnerability information supports faster incident response. The analyst’s risk rating will be more accurate, and reduces the risk of false-positives. Our solution integrates with all major SIEM vendors on the market.

Built on Tenable Nessus and Tenable Security Center, the market leading Vulnerability Management technology is available for you. Operated, maintained and hosted in the Nordics from our Security Operation Center. A pure
as-a-Service model based upon a monthly subscription allow you the flexibility you need when your infrastructure changes.

Want to know more? Email your questions to an expert here >>

The Combitech Vulnerability Management Family

Perimeter Scanning – Detects and gives you a valuable tool to mitigate vulnerabilities in your systems exposed to the internet.

Internal Scanning – Detects and gives you a valuable tool to mitigate vulnerabilities in your internal network. We offer both traditional centralized scanner methodology and our agent-based scanners to fit your needs.

Scanning of Cloud Deployments – Specially designed components used to detect and mitigate vulnerabilities in systems in your cloud-based deployments.

Our solution helps you adhere to wide choice of Compliance standards.

  • ƒCompliance auditing: FFIEC, FISMA, CyberScope, GLBA, HIPAA/HITECH, NERC, PCI, SCAP, SOX
  • ƒConfiguration auditing: CERT, CIS, COBIT/ITIL, DISA STIGs, FDCC, ISO, NIST, NSA

The Report

Our reports are structured based on customer feedback to provide an easy-to-understand overview of your
vulnerabilities and include the following:

Periodic Summary - Our senior analyst team creates a high level easy to read summary commenting high-level the results for the latest month.

Scope Overview - Gives you a clear understanding of which targets that are included in the report.

Top 10 Vulnerabilities - The most critical vulnerabilities listed first. Discovery method and remediation suggestions is included.

Visualization of Trends - Usable to track the changes in the vulnerability count over time.

Overview of Scanned Websites - Gives you a clear understanding of which websites that are included in the report.

Overview of Scanned IP-addresses - Gives you a clear understanding of which IP-addresses that are included in the report.

Learn more about: