Vulnerability management is a proactive cybersecurity strategy that helps businesses identify, assess, and remediate security weaknesses before they can be exploited. It involves continuous monitoring, risk-based prioritisation, and timely patching of vulnerabilities across networks, applications, and systems.

By implementing a structured vulnerability management process, organisations can reduce their risk exposure, strengthen their defences against cyber threats, and maintain compliance with industry standards. This approach ensures that security gaps are addressed efficiently, minimizing potential disruptions and safeguarding sensitive data. 

Benefits of Vulnerability Management for your Business

  • Peace of mind that vulnerabilities are being taken care of
  • Complete visibility of hardware assets and vulnerabilities
  • Improves security by undertaking proactive action to mitigate vulnerabilities
  • Regular scanning networks for rogue devices
  • It can reduce insurance costs by having a vulnerability management solution in place
  • Benchmark configurations against security standards NIST, Cyber Essentials, CIS standards
  • Our solution includes external and website vulnerability scanning

Our Vulnerability Management Process

Vulnerability Management Process
  • Identify vulnerabilities that might exist in your IT systems.
  • Prioritise your most critical assets first.
  • Assess the vulnerabilites and how they might be exploited by attackers.
  • Report the vulnerabilities to stakeholders and agree appropriate action to take.
  • Remediate vulnerabilities by configuring settings, patching software, removing unsupported applications.
  • Verify remediations have been successfully applied.

How does Vulnerability Management as a Service work?

IDENTIFY

Kriston Technology will deploy our advanced vulnerability management agent to all your devices. We help you complete a simple questionnaire to determine your external assets and network ranges, and we’ll start to collect data on the vulnerabilities on your devices and in your network.

PRIORITISE

Once we’ve identified the vulnerabilities, we’ll prioritise them, and focus on your critical assets. The prioritisation is based on the Common Vulnerability Scoring System (CVSS), a rating method form 0 to 10, where 10 is the highest severity.

Notes on EPSS


ASSESS

We’ll assess the vulnerabilities, identifying those most likely to be exploited, this goes beyond the CVSS and uses EPSS…..

Add more text.


REPORT

We’ll report our findings to stakeholders and provide recommendations for remediation to be agreed upon.

REMEDIATE

Kriston Technology will either take sole responsibility for the remediation, or work with your Internal IT or your external IT support team to remediate the vulnerabilities.

Our advanced vulnerability management agent tool has the ability to automate many of the remediations.

VERIFY

Finally, with our advanced vulnerability management agent, we can verify the remediations have been applied correctly, and track vulnerability trends over time. 

We are trusted by:

FluoRok
Seloxium
Oxford University Innovation
Severn Trent Green Power

Our Penetration Test Methodology

We combine multiple methodologies that were once manually conducted into an automated fashion to consistently provide maximum value to organisations.

Egress Filtering

Egress Filtering Testing

Automatically perform egress filtering to ensure that your organisation is effectively restricting unnecessary outbound traffic. Unrestricted outbound access can allow a malicious actor to exfiltrate data from your organisation’s environment using traditional methods and unmonitored ports.

Authentication Attacks

Authentication Attacks

Upon the discovery of user account credentials, vPenTest will automatically attempt to validate those credentials and determine where they are most useful. This is a common process executed by both malicious attackers and penetration testers and is performed during privilege escalation.

Privilege Escalation

Privilege Escalation & Lateral Movemet

Using a valid set of credentials, vPenTest will attempt to identify valuable areas within your organization. This is conducted through a variety of methods, including the use of Vonahi’s Leprechaun tool which assists in identifying where sensitive targets are.

Data Exfiltration

Data Exfiltration

Critical data leaving your organisation is an extremely serious concern. If access to confidential and/or sensitive data can be attained, vPenTest will simulate and log this activity to help your organisation tighten areas that should restrict data exfiltration.

Simulated Malware

Simulated Malware

With elevated access, we will attempt to upload malicious code onto remote systems in an attempt to test the organisation’s end-point anti-malware controls.

Timely Reporting

Timely Reporting

We’ll generate an executive summary, technical and vulnerability report within 48 hours after the penetration test is complete. Our detailed deliverables will allow your network staff to cross reference our activities with monitoring and alerting controls.

Assessment Capabilites

We offer two different automated penetration testing services to guide your organization to a better security posture and program.

 

 

 

   

Internal Network Penetration Testing

Using a device connected to your internal environment, our consultants will discover security vulnerabilities present within the internal network environment. These activities simulate that of a malicious attacker.

External Network Penetration Testing

Assuming the role of a malicious attacker from the public Internet, our consultants will identify security flaws within your external network environment. These flaws can include patching, configuration, and authentication issues.