Active vulnerability management

Our three-tiered VMaaS (vulnerability management as a service) takes the pressure off your team, allowing you to focus on your key objectives. From actively scanning your sites and assets for vulnerabilities, producing easy-to-understand, actionable tickets, and monitoring the feeds of your major partners for patching info, we simplify the steps to compliance and security in one managed service.

How it works

Regular Scans 

Our active scans provide you with high-level visibility on your choice domains, subdomains, or IPs. The scan frequency, the number of scan profiles, and the remediation policy are determined by your tier. Scans can be configured to run behind logins, to run within specified windows, and customised further depending on your number of available profiles.

Asset Monitoring

Active asset monitoring helps you identify, categorise and prioritise the security and compliance risks posed by low-visibility assets, allowing you to head them off quickly and strategically, and giving you a wider picture of your total vulnerability.

How it works

Emergency Patch Monitoring

In a world where your application relies on a complex ecosystem of partners and services, ensuring your entire stack is up-to-date is crucial. Our active patch monitoring considers your whole solution, keeping ahead of the patch bulletins and RSS feeds of your key partners and providers.

Platform Monitoring 

With cloud assets stored in multiple regions, and, in some cases, with multiple providers, it can be difficult to track and manage all your vulnerabilities across a complex network. We monitor alerts from AWS and Azure security streams, providing a single, high-visibility window to your vulnerabilities and potential compliance issues for all cloud environments.

Tiers

Tier 1 – Active Vulnerability Management

  • Domains – 1
  • Scan profiles – 1
  • Scan frequency – 1 per month 
  • Asset-monitoring in real-time – no 
  • Scan behind login – no 
  • Set scanning window – yes 
  • Emergency patch monitoring – yes 
  • Monitoring from AWS / Azure – no 

Tier 2 – Active Vulnerability Management Plus 

  • Domains – 5
  • Scan profiles – 5
  • Scan frequency – bi-weekly
  • Asset-monitoring in real-time – yes 
  • Scan behind login – yes 
  • Set scanning window – yes 
  • Emergency patch monitoring – yes 
  • Monitoring from AWS / Azure – yes 

Tier 3 – Active Vulnerability Management Enterprise 

  • Domains – 6+
  • Scan profiles – 6+
  • Scan frequency – weekly and upon threat detection
  • Asset-monitoring in real-time – yes 
  • Scan behind login – yes 
  • Set scanning window – yes 
  • Emergency patch monitoring – yes 
  • Monitoring from AWS / Azure – yes 

Get in touch

If you need Active Vulnerability Management as a Service, get in touch:

Other Managed Services

  • 24/7 Support

    Specialists in application level 24/7 support, a service competitors can’t match, with guaranteed service levels and support for critical and priority incidents.

  • Manged Cloud Hosting

    Our managed cloud offering allows you to optimise your spend, gain access to new features, and rest assured your infrastructure is being looked after by the very best.

Why Just After Midnight

  • Perfectly positioned to provision VMaaS

    We're the go-to support people. That means that unlike some legacy providers, we have the right culture in place when it comes to fast multi-channel communication, relationship management and ownership. Plus, we're cloud native, so agility and innovation are second nature to us.

    Check mark icon
  • WE ARE GLOBAL

    With our offices around the world and in three different time zones, we can work with any company, and jump straight on any issue as and when it arises.

    Check mark icon
  • PARTNER WITH SOMEONE YOU LIKE

    We pride ourselves in providing gold standard client servicing; providing superb communication, monitoring and continual improvement.

    Check mark icon
  • A well-rounded understanding

    We're experts in both application and infrastructure, so when it comes to helping you meet your security and compliance goals, we can achieve expert reporting and remediation on both aspects of your project.

    Check mark icon