NVA Methodology
- Initial Consultation: During this consultation, you’ll discuss your organization’s specific needs, objectives, and any concerns related to network security.
- Scope Definition: This includes determining which systems, networks, and applications will be reviewed and the depth and breadth of the assessment.
- Assessment: Our team will conduct the vulnerability assessment according to the agreed-upon scope. The network vulnerability assessment involves using specialized tools and techniques to identify vulnerabilities within your network infrastructure, systems, and applications.
- Data Collection and Analysis: Throughout the assessment process, Tanner will collect data on identified vulnerabilities and analyze their potential impact on your organization’s security posture.
- Reporting: We will compile the findings into a detailed report once the assessment is complete.
- Follow-Up: Our team will follow-up assessments or ongoing monitoring to ensure that remediation efforts are effective and to identify any new vulnerabilities that may arise over time.
Additionally, you’ll have direct access to an experienced Information Security Analyst who can clarify your report, discuss discovered vulnerabilities, and offer guidance on recommended actions.