Vulnerability Scanning Tools
Discover every Vulnerability that Matters - Identify Vulnerabilities through testing and scanning.
Vulnerability Scanning Tools
Discover common vulnerabilities across app, API, network and server configuration issues.
Take advantage of Cyber Legion managed security scanning service and integrated testing tools to scan you application, network and find every vulnerability that matters. All findings are delivered in a single dashboard with advanced tracking, collaboration and reporting options.
Cyber Legion is a One stop-shop solution to serve all business stakeholders to ensure that their businesses are well guarded against security issues and cyber attacks. One Security platform for all your company security threats, risks, vulnerabilities and engagements.
To initiate a scan you must must be register with Cyber Legion. You can SignUp for Free on the Secure Client Portal.
From your account you can order any of our scanning and testing services by using the Submit Work Request button.
Using the same feature you can order multiple services in one order or request for a custom offer.
From this point you will receive by email all the steps to follow as well as the Invoice, the Contract and the NDA – Non-disclosure Agreement.
Once we’ve completed all of these steps and obtained your approval for the targets that are within the scope of the scan / test, we’ll schedule the scans according to the specified time frame.
Our engineers will take care of everything else and the all security findings will be available in real time on the web portal which will give you clear visibility on the uncovered vulnerabilities.
There are a number of factors that affect the cost of a vulnerability scan including the environment being scanned.
On average, a single scan costs start at £19.00 / Scan or you can ask for a custom offering depending on the number of IPs, servers, or applications scanned.
Scan tools run a series of control scenarios on your networks, commonly known as a vulnerability scan, which can take 1-3 hours for a quick scan or over 10 hours for a more extensive scan. Scan times may differ depending on your environment.
It is not uncommon that a full vulnerability scan can take more than 10 hours to complete testing in complex applications.
Our SLA is to make the results available within 24h after the scan order has been submitted.
If you use a CMS – yes, you do. We found out that more than 35% of web applications built using CMS platforms have vulnerabilities. This means that your CMS has a one-in-three chance of having a security vulnerability that may be used by someone to attack you.
You need a black-box scanner (DAST) to check your CMS. A white-box scanner (SAST) is only used during the development of custom-written applications. For a CMS, you need a specialized black-box scanner that focuses on CMS vulnerabilities and can also check your CMS host for network vulnerabilities and find malware in your CMS.
Some web vulnerabilities may have serious consequences. You may lose control over your CMS if someone can steal your admin password and change it. You may also lose all data stored in the CMS. An attacker may even potentially use your CMS later to attack your other interconnected systems.
Cyber Legion offering black-box and Whitebox scanners that has a lot of specific tests for all common CMS platforms as well for latest CVs, network and data leakages. It also has a lot of generic tests that apply to custom-made applications, including any custom CMS plugins. It is your best line of defense against malicious hackers.
Security Scanning Workflow – How it Works?
2. NDA , Agreements & Digital Signature
We have a flexible pricing framework that can fits everyone. You can choose an existing standard service, a monthly subscription plan or ask for & accept a customized proposal. We'll work with you to evaluate and setup the scope of the engagement, (domains, applications, networks, cloud infrastructure, mobile, IOT etc). Our Web Client Portal is integrated with Digital Signature, that enables us to sign all required documents and agreements to legally engage and perform security tests on the target systems.
3. Security Scanning & Testing
We meet agreed SLAs and follow security testing Framework checklists. Based on the commitment, our team of engineers will use our tools, automation and testing capabilities to achieve the objectives.
4. Findings, Reporting & Remediation
All security findings will be available in real time on the web portal which will give you clear visibility on the uncovered vulnerabilities. Along with the reporting of our findings, we provide you with an extensive set of recommendations to support senior executives and IT/Dev/Engineering teams to implement mitigation and remediation.
5. Retesting & Validation of Remediation
All our security services includes a Free retesting to validate if the issue has been fixed or the mitigations have been implemented. You can choose various security testing services for continuous vulnerability discovery and validation. All delivered via the Secure Client Portal