PCI Approved Scanning Vendor (ASV) Service
PCI Approved Scanning Vendor (ASV) Service
![Risk-management image of the MTI risk management icon](https://www.mti.com/wp-content/uploads/2017/06/Risk-management.png)
Blended PCI Vulnerability Assessment Services – What is it?
The purpose of Westpoint’s blended vulnerability assessment service is to assist clients in the effective ongoing management of system vulnerabilities, whether they be on web servers, database servers, firewalls, routers or other key components of their IT infrastructure.
Each quarter, month, week, or at other defined periods (e.g. ad-hoc / once-off assessments) Westpoint perform an extensive number of vulnerability tests on your systems to determine if they are open to attack or exploitation. Each set of tests result in a concise report of findings as free of false positive results as can be achieved within the constraints of a remote, un-authenticated assessment. Where vulnerabilities have been discovered remedial actions are suggested. Reports are securely delivered to any number of contacts in your organisation.
Vulnerability Assessment Scan Reports
You will receive a PCI ASV Scan Report for each assessment conducted during the scan period, details vulnerabilities for the target systems, in a format required and approved by PCI Security Standards Council. It also provides excellent management trending and charting to monitor how vulnerabilities are being managed over time.
Service Methodology includes:
Accreditations
![Check-Logo Image of the Check logo](https://mtidata.wpengine.com/wp-content/uploads/2017/07/Check-Logo.jpg)
![Crest-Logo Image of the Crest logo](https://mtidata.wpengine.com/wp-content/uploads/2017/07/Crest-Logo.jpg)
![ISO-17025-Logo image of ISO 17025 logo](https://mtidata.wpengine.com/wp-content/uploads/2017/07/ISO-17025-Logo.jpg)
![UKAS-testing-Logo UKAS testing logo](https://mtidata.wpengine.com/wp-content/uploads/2017/07/UKAS-testing-Logo.jpg)
MTI Security partners
![CA-tech-logo image of the ca logo](https://mtidata.wpengine.com/wp-content/uploads/2017/07/CA-tech-logo.jpg)
![Cyberark-logo image of the cyberark logo](https://mtidata.wpengine.com/wp-content/uploads/2017/07/Cyberark-logo.jpg)
![Forcepoint-Logo image of the forcepoint logo](https://mtidata.wpengine.com/wp-content/uploads/2017/07/Forcepoint-Logo.jpg)
![Gemalto-Logo image of the gemalto logo](https://mtidata.wpengine.com/wp-content/uploads/2017/07/Gemalto-Logo.jpg)
![Mobile-iron-logo image of the mobile iron logo](https://mtidata.wpengine.com/wp-content/uploads/2017/07/Mobile-iron-logo.jpg)
![Paloalto-Logo image of the paloato logo](https://mtidata.wpengine.com/wp-content/uploads/2017/07/Paloalto-Logo.jpg)
![Qatchguard-Logo image of the Watchguard logo](https://mtidata.wpengine.com/wp-content/uploads/2017/07/Qatchguard-Logo.jpg)
![Splunk-Logo Splunk Logo](https://mtidata.wpengine.com/wp-content/uploads/2017/07/Splunk-Logo.jpg)
![Trend-Logo image of the trend micro logo](https://mtidata.wpengine.com/wp-content/uploads/2017/07/Trend-Logo.jpg)
![Varonis-Logo Varonis Logo](https://mtidata.wpengine.com/wp-content/uploads/2017/07/Varonis-Logo.jpg)
![VMware-Logo Image of the vmware logo](https://mtidata.wpengine.com/wp-content/uploads/2017/07/VMware-Logo.jpg)