Security Solutions

Web Application Security Scan and Analysis

Web applications are an interface to privileged processes and sensitive data that can be exploited by malicious users.

Our security assessment covers any external or internal web-based application. We conduct a thorough scan to determine all vulnerabilities such as Cross-site Scripting, SQL Injection, Cross-site Request Forgery, Clickjacking and other vulnerability categories rated by the Open Web Application Security Project (OWASP).

We offer thorough, detailed, and consistent application assessments that will provide you with the information you need to correct existing security flaws and inform your people how to reduce the introduction of new flaws. Our process begins with a scan of your application to collect vulnerability information and generate a complete, automated report powered by QualysGuard WAS. Once this report is ready, we review the findings and prepare a hand-written analysis that presents the salient details for your review. We leverage best-in-class tools and years of expertise to provide actionable reports which will enable rapid, material improvements to your applications’ security posture.

Deliverables

Once the work is complete, SourcePanel will provide a pdf of the vulnerability scan results, and an additional report generated by our experts containing:

  • A summary of vulnerabilities found.
  • Explanation of the vulnerabilities.
  • Recommendations for remediation of each of the vulnerabilities.

Milestones

Milestone 1
Application qualified (we can access the app and login if necessary)

Milestone 2
Discovery Scan Complete

Milestone 3
Vulnerability Scan Complete

Milestone 4
Report Delivered

Two Levels of Engagement

SourcePanel Application Security Scan Analysis solution offers two levels of engagement:

  1. The first level is for anonymous scanning of the web application ( no credentials to login).
  2. The second level includes one credentialed login role to scan.

To scan and analyze multiple credentialed roles, a separate solution purchase is required for each role. The scan requires no credentials to test any logged in roles.