Vulnerability Scanning Service

Discover security vulnerabilities and eliminate hidden risks.

CDNetworks’ vulnerability scanning service is a cloud-based vulnerability solution that discovers cyber security weaknesses in host systems and web-based applications to safeguard against attacks and avoid costly data breaches. Using comprehensive security vulnerability scans, CDNetworks’ vulnerability scanning service generates reports detailing the state of application, host, and web security, along with recommendations to remedy known security vulnerabilities.

With its deep database of computer vulnerabilities, security professional also timely follow up the Zero-Day vulnerability, and CDNetworks vulnerability scanner can discover a myriad of security flaws. The CDNetworks security team works in lockstep with CDNetworks vulnerability scanner to provide additional proactive steps for analyzing vulnerability scanning reports and offering solutions based on the scanning results.

Features

Rich Vulnerability Database

CDNetworks has a comprehensive vulnerability database based on the international CVE standard that contains over 2,000 vulnerabilities and real-time updates.

High Accuracy

All scanning results are verified manually by CDNetworks security professionals to ensure the highest degree of accuracy.

Professional Guidance

The CDNetworks security team is dedicated to helping enterprises discover and fix security vulnerabilities before they can be found and breached by cyber attackers.

Multi-dimensional Scanning

Professional vulnerability scanning for a variety of enterprise assets, including but not limited to web applications, hosts, and middleware.

Host Security

Scanning security problems rooted in operating system (OS) and third-party vulnerabilities, including identity authentication, access control and system vulnerabilities, and OS security configurations.

Web Application Security

Discover OWASP TOP10, weak passwords, CVE vulnerabilities, and other flaws in web applications to increase security.

Middleware Security

Security vulnerability scanning can detect versions of middleware running on servers and identify risks posed by malicious patterns between middleware components and/or resources, such as mainstream web containers, foreground development frameworks, and background microservice technology stacks.

How It Works

Vulnerability scanning uses evaluation tools to scan systems and networks within an intranet and extranet for possible security risks and vulnerabilities in server hosts, web services and applications, and third-party middleware.

Vulnerability Scanner Workflow

Frequently Asked Questions

CDNetworks’ vulnerability scanning service is a cloud-based vulnerability solution that discovers cyber security weaknesses in host systems and web-based applications to safeguard against attacks and avoid costly data breaches. Using comprehensive security vulnerability scans, CDNetworks’ vulnerability scanning service generates reports detailing the state of application, host, and web security, along with recommendations to remedy known security vulnerabilities. Then CDNetworks would double check the security status of system after customers fixed the vulnerabilities following the recommendation.  

Because Network security is dynamic and evolving, and in the process of building and maintaining a security system, vulnerability scanning service can discover various security risks and vulnerability in systems so that you can fix them timely before hackers and illegal person, thereby protecting your assets.

  1. Before the new launch of business systems, detecting security hazards to ensure the safe and stable operation of business systems.
  2. Regular network security self-test and assessment to eliminate security hazards.
  3. Security assessment and effectiveness inspection during network construction or transformation.
  4. Security tests before major events/tasks.
  1. Multi-dimensional Scanning
    Professional vulnerability scanning for a variety of enterprise assets, including but not limited to web applications, hosts, and middleware.
  2. Rich Vulnerability Database
    CDNetworks has a comprehensive vulnerability database based on the international CVE standard that contains over 2,000 vulnerabilities and real-time updates.
  3. High Accuracy
    All scanning results are verified manually by CDNetworks security professionals to ensure the highest degree of accuracy.
  4. Professional Guidance
    The CDNetworks security team is dedicated to helping enterprises discover and fix security vulnerabilities before they can be found and breached by cyber attackers.
  1. Server host scanning items
    Port scanning, weak password detection, DNS domain transport vulnerabilities, server fingerprinting, windows SMB remote code execution vulnerabilities, various buffer overflow vulnerabilities, 3389 remote overflow, etc.;
  2. Web service scanning items
    OWASP Top 10 vulnerability scanning (SQL injection, XSS, etc.), various CVE vulnerabilities (buffer overflow, remote command execution), file inclusion vulnerabilities, URL jumping vulnerabilities, directory traversal vulnerabilities, web backend probes, web application fingerprinting, etc.
  3. Middleware detection
    phpmyadmin, tomcat, web logic, etc. weak passwords; MySQL, Oracle, DB2, etc. weak passwords; struts 2 command execution vulnerabilities, web logic deserialization vulnerabilities, various known CVE vulnerabilities, middleware configuration errors, etc.
  1. Domain name (sub-domain) and IP range you need to scan.
  2. Specific scanning time, thread pressure, etc.
  3. Business environment situation, for example, is it accessible to the external network? Is there a security device?
Enterprise Secure Access Hero Scene

Enterprise Secure Access

Zero-Trust Access to Secure Hybrid Network