Vulnerability Assessment

Vulnerability Assessment

Protecting your network from malicious attackers

Vulnerability scanning helps identify security flaws and monitors your systems for potential weak points.


Scans should be conducted on a regular basis, but in reality few organizations have the necessary resources. This often means vulnerability scanning becomes an infrequent event. But with networks and applications constantly being updated, this can be insufficient and leave your organization vulnerable. Adopting a managed approach provides a secure alternative.

Key benefits


Locate and secure your network vulnerabilities


Clarium Vulnerability Scanning enables you to scan your network for potential weaknesses on a regular basis – without placing an additional burden on your IT and security resources. The service delivers:


Enhanced security: we respond to threats in real time, enabling you to take advantage of our expertise and resolve network issues before they harm your business.


Reduced management complexity: we manage the setting up, scheduling and maintenance of the scan service, only alerting your team to genuine security threats.


Payment Card Industry (PCI) compliance: specialized options provide the quarterly scans and fixes required to comply Payment Card Industry audit procedures.


Flexible package options: there are three scanning options; monthly, weekly and unlimited – enabling you to choose the timing and frequency that works best for you.


Cost efficiency: integrates with Clarium Threat Monitoring services enabling you to outsource network security to a single provider – simplifying maintenance and delivering economies of scale


Key features and benefits


Identify threats outside and inside your network


Key features of Clarium Vulnerability Scanning include:


Detailed scan reports: these show you where vulnerabilities have been identified on your systems and provide resolution recommendations.


Service availability: scans can be scheduled to be conducted at any time of day, 365 days a year, to minimize disruption to your business operations.


Flexible deployment options: scans can be customized to meet your needs. Options include entire address-range and address-specific coverage.


Internal and external scanning: vulnerability scanning helps protect your network from outside attacks as well as identifying internal threats such as rogue software.


Robust infrastructure: the service is offered through our Secure Operations Center (SOC), which are hardened against physical or network-borne threats to protect your scan data.


Trend identification: enhanced dashboard reporting through the CLARIUM portal enables you to identify problem areas and spot security trends quickly.


Detailed description


The managed approach to network vigilance


Clarium Vulnerability Scanning helps you to protect your infrastructure from the threat of malicious attackers. The service enables you to locate, identify and understand your network’s security vulnerabilities and provides the first step to securing them.


Every update to your infrastructure brings the potential for new vulnerabilities along with the benefit delivered. If, like most organizations, you are continually updating systems, granting access to users and installing new applications, then vulnerability scanning needs to be an on-going process in order to effectively protect your business-critical assets.


Clarium Vulnerability Scanning frees you from the complexities of setting up, scheduling and maintaining regular security scans, enabling your IT staff to focus on more strategic projects.


Identify your weak points

We create and maintain an inventory of your assets to help identify your vulnerabilities and provide specific recommendations for enhancing security. We offer internal and external scans on a weekly, monthly or unlimited basis. This enables you to minimize disruption since scans can be conducted at a time convenient for your business operations.


Scans can be customized to cover an entire address range or only the network devices that are monitored and/or managed by CLARIUM. All scans are correlated across data from vendors as well as data from our proprietary correlation engine. After each scan is completed, we provide you with an executive summary, a detailed scan report and resolution recommendations, and available 24/7 via the CLARIUM portal.


Technical specs


Expert support from identification through to resolution


There are two stages to Clarium’s Vulnerability Scanning


Stage 1: The initial setup


All of our security engagements begin with an initial integration period, which is included with all contracts at no additional charge. During this period you will be assigned an integration team who will work alongside your IT and Security staff. The integration team will introduce you to key CLARIUM personnel, practices and terminologies, as well as ensuring your network devices are tuned and base-lined to minimize the risk of false-positives. This is where the scan identifies a potential vulnerability that may not actually exist.


Our internal scan requires the installation of an on-site scanning device which is complemented by our external scanners. The integration team will also assist you in developing contact trees and escalation protocols to be followed in the event of an emergency. Contact with the team will usually consist of approximately one hour per week over the phone, with additional support available online.


Stage 2: Ongoing monitoring


Once the integration stage is complete, we can begin monitoring your network for potential vulnerabilities. During this stage, you will receive detailed reports that not only identify security flaws, but also provide specific remediation information – enabling your administrators to fix the root cause of the problem. When an incident occurs, our Security Operations Center (SOC) provide on-going assistance until the situation has been resolved to your satisfaction.


Who should buy?


Simplify and enhance network monitoring


Clarium’s vulnerability scanning can be of benefit if you are constantly updating your IT systems but don’t have the internal resources or expertise to conduct and analyze a high volume of network scans. The service can also help you if your organization has a number of large disparate networks and is looking to consolidate management of vulnerability scanning.


Clarium’s vulnerability scanning complements and enhances our Threat Monitoring services by cross-referencing real-time monitoring data against a continuously updated asset inventory. This makes it the ideal service if you are an existing Clarium Threat Monitoring customer looking to benefit further from outsourcing to security specialists.




Clarium’s (SecS)² managed security platform and bundles are available globally.




A leader in network security


There are six good reasons to choose CLARIUM for your security and compliance needs:


Depth of experience in managed security: CLARIUM has more than 15 years’ experience providing managed security for enterprises.


A commitment to global reach and scale: Our Secure Operation Center (SOC) provides global reach with local touch.


Range of visibility and insight: we can monitor and compare security data from any of your critical assets able to send us system logs.


Objective security advice: CLARIUM has a close technical relationship with the leading security product vendors.


Strong commitment: our investment in managed security to deliver the best security infrastructure is second to none.


Advanced correlation technology: we correlate your network information with our database of real-world threats, attack signatures, patterns and known vulnerabilities.