cybersecurity related images

Database Vulnerability Scanning

Test your databases for vulnerabilities often

This service includes the scanning of databases and is conducted with credentials to provide a full and comprehensive view of the database(s). The database scanning tool is updated to the latest knowledge version prior to any scan assessment.

  • Each discovered vulnerability will be analyzed, compared, and cross-referenced against the National Vulnerability Database (NVD) and Common Vulnerabilities and Exposures (CVE) database.
  • The final report will be provided that includes an executive summary, a walkthrough of technical risk, potential impact of vulnerabilities found, and vulnerability remediation options.

Note: This is typically a subset of our Penetration Testing services but can be provided as a standalone offering, depending on the customer's requirements.

Eligibility

Federal civilian agencies are eligible to use these cybersecurity services from the DOT Enterprise Services Center (ESC). Department of Defense (DOD) organizations may be eligible for ESC cybersecurity services if their systems are unclassified.

Interested in this Fed-to-Fed service? Get a quote!

To get started, reach out to the ESC team. We will send you a simple questionnaire to fill out. Return the completed questionnaire to us and we will promptly develop a firm fixed-price quote, to include proposed schedules. If you just need a rough order of magnitude (ROM) estimate for budget planning purposes, just let us know.

Contact ESC at CyberServices@esc.gov to get more information and assistance.