Lock it Down.

CompuSource Systems, Inc. and technology parter DaraSure24 protect your most valuable digital assets around the clock.

datasure technology partner
search

Vulnerability Scanning

Vulnerability scans are completed by trained Security Operation Center (SOC) staff with minimal intrusion, to identify, define, and prioritize system susceptibilities. The assessments made from the scans are continuously updated to ensure safety against the latest threats. Our SOC Analysts provide a summary accompanied by a more detailed report including a break-down on any vulnerability threatening your systems. >Using credentials given to the scanning tool, a pathway into the system can allow the tool to view exact program versions and other vulnerabilities that may not be visible from the network.

The scan is also able to operate inside of the host, reducing the load on your network. Internal vulnerability scanning is included in our core and enhanced compliance 24/7 SOC offerings. CSS also offers external vulnerability scanning. We perform a full network scan from the outside to determine exposure to external threats. Reports are generated from the results of the scan, accompanied by a detailed summary of any external vulnerabilities exposing threats to systems and critical infrastructure. The CSS cyber security team will schedule a time to discuss and remediate any vulnerabilities reported.

What we monitor:

  • Windows Updates
  • Microsoft Security Bulletins
  • Missing application security updates
  • Default accounts
  • Remote shell access
  • Service detection
  • Local system security configuration
  • SQL injection, XSS and denial of service attacks
  • SSL/ TLS configuration
  • Certificates
  • Web server and application attacks
  • Database attacks
  • Remote code execution
  • Privilege escalation

Dark Web Scanning

Dark Web Scanning provides continuous searching, monitoring and reporting of your credentials on the part of the web that Google doesn't see - the Dark Web. Dark Web Scanning can identify exposed credentials and prevent criminal activity, data breaches and identify theft. We use the first commercially available solution to scan for compromised credentials on the dark web. This gives us a critical tool to protect our client's most valuable digital assets, their credentials, and to reduce the risk of your company being in the headlines due to a data breach.

Why do I need a Dark Web Scan?

Users often have the same password for multiple services and websites, such as their network login information, social media, online stores and others. This exponentially increases the potential damage from a single compromised username and password. Today, customers have limited visibility into when their credentials are stolen. Over 75% of compromised credentials are reported to the victim organization by a third-party, such as law enforcement.

What we monitor:

  • Hidden chat rooms
  • Social media platforms
  • Private websites
  • Black market sites
  • Peer-to-peer networks
  • 640,000+ botnets