To answer the security needs of the market, a preferred embodiment was developed. A preferred embodiment provides real-time
network security vulnerability assessment tests, possibly complete with recommended security solutions. External
vulnerability assessment tests can emulate
hacker methodology in a safe way and enable study of a network for security openings, thereby gaining a true view of
risk level without affecting customer operations. Because this assessment can be performed over
the Internet, both domestic and worldwide corporations benefit. A preferred embodiment's physical subsystems combine to form a scalable holistic
system that can be able to conduct tests for thousands of customers any place in the world. The security skills of experts can be embedded into a preferred embodiment systems and automated the test process to enable the security
vulnerability test to be conducted on a continuous basis for multiple customers at the same time. A preferred embodiment can reduce the
work time required for security practices of companies from three weeks to less than a day, as well as significantly increase their capacity. Component subsystems typically include a
Database, Command Engine, Gateway, multiple Testers, Report Generator, and an RMCT.