Vulnerability Scanning Part of TrustedSite Security

Find vulnerabilities before it's too late.

Our server and web application vulnerability scanning is intuitive and user-friendly, helping you protect what matters so your business can get on with what it does best.

Get a Demo   Watch the Video

  Or call us at 1-888-600-1892

Take care of what matters with world-class vulnerability scanning.

We look at your perimeter the same way hackers do—from the cloud. Our automated discovery constantly monitors your network for changes, and lets you know when you've left yourself vulnerable.

In a clear, actionable dashboard, we'll show you where you have open ports, which of your sites are vulnerable, and exactly what vulnerabilities might be exploited by hackers.

We'll provide you critical information on any vulnerabilities that our Qualys-powered scan detects, such as the code used to exploit your network, what it targeted, and most importantly, how to resolve the problem.

Daily scanning definitely gives us a lot more peace of mind... Now we know our customers are indeed safe, not just feeling safe."

Joel Holland, CEO, VideoBlocks

What You Get


What's the difference between PCI and vulnerability scanning?

As an Approved Scanning Vendor, we offer PCI compliance scans as an optional add on to our vulnerability scanning service. This add-on can be purchased when adding a new vulnerability scanning target or at a later point as needed.

PCI scans serve a very specific purpose: They're meant to keep you PCI compliant. PCI standards provide the framework for organizations to ensure that credit card information is kept safe from hackers and breaches. With the PCI add-on, you can generate PCI compliance reports for any scanning target that is in PCI scope. Once your reports are approved, you can submit them to your merchant bank to show that you meet PCI compliance requirements.

Vulnerability scans, on the other hand, are used by website owners to proactively address any security issues that websites may have. These scans help you identify parts of your website that are easily exploited by hackers. Please note that vulnerability scans without the PCI add-on can't be used for PCI compliance purposes.

Learn more about PCI Compliance

Will the scan negatively impact my network?

Our system performs external scans, so there is no penetration of the actual network and no software updates required.

How long does scanning take? How often can I run scans?

The length of a scan will vary based on the type of scan and other factors such as bandwidth, type of target, and network latency. On average, applications scans take around 4 hours while server scans take around 90 minutes.

You can schedule scans to run daily, weekly, monthly, or quarterly and you can run unlimited on-demand scans.

How much does it cost?

TrustedSite Security bundles start at $950 per year. Get started today »