“Know yourself, and you will win all battles.”
— Sun Tzu, The Art of War
Your website, VPN, webmail, remote desktop and other exposed assets present a tantalizing target for an attacker to exploit to gain access to your network. One of the first things that an attacker will do is look for vulnerable attack surfaces in your environment with a vulnerability scan.
How Does it Work?
Complete the form below with your organization name, the target IP Address and your name, email address and phone number. Once received, we will reach out to you to confirm that you requested the scan and to schedule a date and time for the scan to run. Once the scan is complete, we will email you a copy of the results.
How can I find my IP Address?
This information is generally available on paperwork from your ISP (Internet Service Provider) but can generally be obtained by going to https://ipchicken.com. There are a number of ads on the page but, under ‘Current IP Address’, it will list the IP Address that you are connecting from. In most cases, this is the IP Address that you will want to have scanned. Our team will reach out to you to confirm that a) you made the request and b) this is your actual IP Address before executing the scan.
What’s in it for me?
You get easy-to-understand insight into what an attacker sees when they look at your network with real, actionable intelligence that you can use to mitigate or reduce the risk of a network-based attack.
What’s in it for you?
We get to show you a sample of the services that we can provide and, ideally, an opportunity earn additional business.