← Services
Perimeter Security

External Vulnerability Scan

Know Your Perimeter

Your internet-facing infrastructure is the first thing attackers see. Gourd's external vulnerability scanning continuously maps every exposed asset, open port, and misconfigured service — giving you a real-time view of your attack surface before adversaries exploit it.

24/7
Continuous monitoring
99.7%
Detection accuracy
<4h
Mean time to alert
500+
Clients protected
What's Included

Everything You Need
In One Service

Attack Surface Mapping

Automatically discover all internet-facing assets including subdomains, cloud resources, and shadow IT you may not know exists.

Port & Service Scanning

Identify every open port and running service across your perimeter, flagging unnecessary exposure and misconfigurations.

CVE Detection

Match discovered services against the latest CVE database to surface known vulnerabilities with CVSS scoring and remediation guidance.

SSL/TLS Analysis

Audit certificate validity, cipher suites, and protocol versions to ensure encrypted connections meet current security standards.

DNS Security Checks

Detect dangling DNS records, subdomain takeover risks, and missing DMARC/SPF/DKIM configurations that enable phishing attacks.

Change Detection

Receive instant alerts when new assets appear or existing configurations change — critical for catching unauthorised deployments.

The Process

How It Works

01

Asset Discovery

Gourd enumerates your entire external footprint — domains, IPs, cloud endpoints, and APIs — without requiring agents or network access.

02

Vulnerability Scanning

Safe, non-intrusive scanning checks every discovered asset against thousands of known vulnerability signatures and misconfigurations.

03

Risk Prioritisation

Findings are scored by exploitability and business impact, so your team focuses on what matters most rather than chasing noise.

04

Remediation Guidance

Each finding includes step-by-step fix instructions, affected component details, and links to relevant patches or configuration guides.

05

Continuous Monitoring

Scans run on a defined schedule (daily, weekly, or continuous) with real-time alerts for new critical findings or surface changes.

Who It's For

Common Use Cases

Pre-acquisition security due diligence
Quarterly compliance evidence gathering
Post-deployment attack surface review
Identifying shadow IT and rogue assets
Validating firewall and WAF configurations
Preparing for ISO 27001 or SOC 2 audits
Monitoring third-party vendor exposure
Board-level security posture reporting

See Your Attack Surface

Most organisations discover assets they didn't know existed in their first scan. Start your external vulnerability assessment today and know exactly what attackers can see.

Get Started TodayContact Us