A Prescient Vulnerability and Security Assessment is performed using the same process a malicious hacker would take to gain unauthorized access to your data. As a result, it provides your business with an understanding of your environment’s security strengths and weaknesses and the potential consequences of a real cyberattack.
Prescient’s PVSA performs the Scanning and Assessing phases with the same methods, manual processes and automated tools used within a traditional Penetration Test; as a result, the same vulnerabilities and risks are discovered. However, Prescient does not attempt to actually Exploit the weaknesses and vulnerabilities discovered. Exploiting these vulnerabilities does not make the organizations networks more secure, it merely validates the existence of the vulnerability.