cybersecurity related images

Operating System Vulnerability Scanning

Scan your operating systems for vulnerabilities before you have to use your incident response plan

This service will scan the configuration of targeted host operating systems.

  • A final report will be provided that includes an executive summary, a walkthrough of technical risk, potential impact of vulnerabilities found, and vulnerability remediation options.
  • Note: This is typically a subset of our Penetration Testing services but can be provided as a standalone offering, depending on the customer's requirements.

Eligibility

Federal civilian agencies are eligible to use these cybersecurity services from the DOT Enterprise Services Center (ESC). Department of Defense (DOD) organizations may be eligible for ESC cybersecurity services if their systems are unclassified.

Interested in this Fed-to-Fed service? Get a quote!

To get started, reach out to the ESC team. We will send you a simple questionnaire to fill out. Return the completed questionnaire to us and we will promptly develop a firm fixed-price quote, to include proposed schedules. If you just need a rough order of magnitude (ROM) estimate for budget planning purposes, just let us know.

Contact ESC at CyberServices@esc.gov to get more information and assistance.