Vulnerability Scanning Services

Exploiting known vulnerabilities is a favorite technique for cybercriminals because it’s easy and works. In fact, many highly-publicized events, including the WannaCry attack and Equifax breach, leveraged known vulnerabilities.

An important step to protect your organization from this threat is to routinely scan your network for known vulnerabilities. Once identified, develop an action plan to mitigate your risk from that vulnerability.

Given the complex and volatile nature of the cyber threat environment, along with competing priorities and limited resources, it can be difficult to stay on top of this task. Tyler’s Vulnerability Scanning Service is a subscription program that will take this burden off your shoulders and deliver actionable results to mitigate network vulnerability risk.

Service Benefits


Independent Analysis

Independent testing / separation of duties is an information security best practice because it removes bias and is often more effective at finding vulnerabilities. Subscribing with Tyler prevents the potential for fraud or conflict of interest, and it can reduce errors.


Easy-to-Navigate Reporting

Most vulnerability scanning solutions provide a stock report listing all known vulnerabilities found during the scan. This report could be hundreds of pages and difficult to navigate. Tyler’s report organizes and consolidates findings, plus we provide you with an action plan.


Security Expertise

Tyler’s cybersecurity professionals are 100% focused on cybersecurity, working in real time to react to evolving threats, with expertise and judgment gained over decades of experience. We pass that expertise on to you with concise findings and effective remediation recommendations based on the latest threat intelligence.


Consistent & Reliable

New vulnerabilities are discovered every day without fail. These discoveries add to a growing inventory of network exposures that requires constant monitoring and assessment. Tyler’s subscription delivers consistent vulnerability scans based on the latest threat intelligence to build network security into your normal business operations.


Cost-Effective & Flexible

No on-site data collection is required, which saves you both time and money. The initial configuration and subsequent scans are all done remotely. Scans can be performed according to your frequency and timing needs. Your subscription can include internal network, external network, or both.

Service Overview

  • Tyler’s Vulnerability Scanning Service identifies system and device specific vulnerabilities based upon the Department of Homeland Security Common Vulnerabilities and Exposures (CVE) database.

  • Scanning is conducted using a licensed commercial vulnerability scanner that supports a wide range of network devices, operating systems, databases, and applications.

  • For internal vulnerability scans, administrative credentials can be used but are not required. However, we encourage scanning the Microsoft Windows environment with domain credentials as the results will be more accurate and reflective of the system’s vulnerability posture.

  • During the vulnerability assessment analysis, Tyler professionals review the results of the vulnerability scans conducted to ensure that the most relevant information is provided; and that it is provided in a clear and concise manner.

  • Once the data has been analyzed, a report will be generated, that includes:
    • A summary of the findings presented in an Executive Report
    • A corresponding interactive HTML report detailing specific vulnerabilities by severity and by device
    • An Action Plan designed to document remediation assignments and activities.
  • In addition, a Tyler professional can present the results to you via a WebEx meeting.

Vulnerability Reports

Tyler's reports are designed for ease of use, so administrators can easily get the information they need to remediate the findings. Finding are organized, consolidated, and sorted by severity and IP Address. You can drill down to see the details of a particular finding, view all vulnerabilities on a single IP address, and view all hosts that have the same vulnerability. You are also provided an editable action plan for tracking remediation.

Contact Us to Request a Demonstration Today!

The Tyler Cybersecurity Lifecycle

Cybersecurity isn’t a destination.

Cybersecurity Lifecycle

There is no single, straight path that will get you to the point where you can say, “We did it! We’re 100% cyber-secure.”

A more realistic destination is cyber resiliency – the ability to prepare for and adapt to changing conditions, so you can withstand and recover rapidly from disruptions. Achieving cyber resilience depends on what we like to call the cybersecurity lifecycle – an ongoing cycle of interconnected elements that compliment and reinforce one another.

Learn More