Understanding risks and keeping computer networks safe from rapidly evolving threats must now be a top priority for every business.  Despite firewalls, anti-virus and intrusion detection solutions, organizations continue to lose time and money to security incidents caused by undiscovered network vulnerabilities.

Our vulnerability/penetration assessment of your network and access points will:

>  Proactively identify security vulnerabilities
>  Provide remediation guidance
>  Manage & reduce business risks
>  Ensure compliance with laws, regulations and corporate security policies

For penetration tests and vulnerability assessments, Underwood & Associates employs the highly-respected QualysGuard network scanner appliance and Vulnerability KnowledgeBase software. QualysGuard scans for more than 5,000 vulnerabilities across hundreds of applications and operating systems. Qualys maintains the industry's most comprehensive Vulnerability KnowledgeBase. New vulnerability signatures are added to the QualysGuard Vulnerability KnowledgeBase every day. These signature updates are automatically available each time we perform a network scan. Qualys leads the industry in terms of audit breadth and pre­cision with a 99.997% accuracy rating. All assets across the network will be identified and mapped, including host details, operating systems, and open services. This will include all servers, desktops, routers, and other networked devices and access points.

A large number of comprehensive and useful reports will be developed as a part of this study. These include graphs and trend reports, network topology maps, discovered vulnerabilities, and remediation instructions. <See additional information about reports>

QualysGuard is useful in helping organizations comply with the Gramm-Leach-Bliley Act of 1999 insomuch as it meets key security technology requirements detailed in the final rules published by the FDIC, Secretary of the Treasury, and many other regulatory agencies.

This trustworthy, unbiased, third-party assessment will include indelible audit trails which meet industry and regulatory compliance needs. The process used is highly non-intrusive since it does not require the installation of software on any of your business’s servers, PCs, or other hardware, nor does it interrupt normal operation and processing.