Attack surface mapping
In attack surface mapping, port and vulnerability scans are run against selected networks using automated tools. The results are analyzed and, where necessary, verified manually.
Network scans enable efficient coverage of even large environments and present the findings in an understandable format. Network scans are targeted at the server level, meaning they do not cover web services and their functionalities. Reporting methods are always agreed upon together with the client. Results can be delivered in spreadsheet format or in a traditional document format.
REFERENCES
SEE ALL
CSC
“I highly recommend 2NS for both individual technical cybersecurity training projects and for more comprehensive cybersecurity partnerships.”
Urpo Kaila, Information security manager – CSC
CableCrew Oy
“The collaboration went so well that from now on, we will use 2NS for our annual audits. Cybersecurity is extremely important to CableCrew because we operate in critical infrastructure. Communication was straightforward, and availability was excellent even outside business hours when needed. All questions were answered by the next day at the latest. Schedules were also communicated in real time.”
Satu-Maria Ravelin, HESQ Director – CableCrew Oy
Kehätieto Oy
“Our collaboration with 2NS has proceeded very smoothly. We have received the support we needed from them for both staff training and security testing of our products. We trust 2NS’s specialized expertise in cybersecurity matters.”
Juhani Ruohotie, Team Leader – Kehätieto Oy