Vulnerability scanning
- asset discovery and mapping
- port and service enumeration
- known vulnerability checks
- compliance checking
Security audits
- system configurations
- security controls
- user access rights
- password policies
Penetration testing
- External pentest
- Internal pentest
- social engineering pentest
- web app pentest
Risk asessments
- asset identitfication
- threat analysis
- vulnerability identification
- impact analysis