Skip to main content
Florida State University Home Florida State University Home

FSU | Information Technology Services

  • Webmail
  • Search FSU
  • Navigation

  • Home
  • Services
  • Cybersecurity
    • Phish Tank
    • Protect Yourself
    • Protect FSU
    • Standards
  • Research
    • Governance
    • RCC User Accounts
    • RCC Account Login
    • RCC Documentation
    • RCC Training
  • About ITS
    • Leadership
    • Planning
    • Initiatives
    • Partnerships
    • News
    • Publications
    • Metrics
    • Policies
    • Contact
  • Help
    • myFSU Service Center
    • Classroom Support
    • IT Support
    • Training
    • FAQs
  • Academics
  • Admissions
  • Research
  • Faculty
  • Students
  • Veterans
  • Support FSU
Information Technology Services

  • Home
  • Services
  • Cybersecurity
    • Phish Tank
    • Protect Yourself
    • Protect FSU
    • Standards
  • Research
    • Governance
    • RCC User Accounts
    • RCC Account Login
    • RCC Documentation
    • RCC Training
  • About ITS
    • Leadership
    • Planning
    • Initiatives
    • Partnerships
    • News
    • Publications
    • Metrics
    • Policies
    • Contact
  • Help
    • myFSU Service Center
    • Classroom Support
    • IT Support
    • Training
    • FAQs
Security and Safety Banner
Vulnerability Assessment
  1. Home
  2. Services
  3. Vulnerability Assessment

Vulnerability Assessment

Request This Service 
Report a Problem
Search for Help

Overview

Any device on the FSU network can be vulnerable to threats when connected to the internet. Even with patching, updating, antivirus and anti-malware software, holes can still appear to allow unauthorized access to workstations, servers, routers and mobile devices. To help identify these gaps, departments have access to several vulnerability management tools to perform their own on-demand or scheduled scans. The vulnerability scanner, powered by InsightVM, performs monthly scans of devices and recommends fixes. For departments seeking comprehensive vulnerability assessment and remediation capabilities, the integration of CrowdStrike's vulnerability management function is also available.

Highlights

Vulnerability Scanning

proactively identify any holes or weaknesses within a system before a threat occurs

Recommendations

get a report of industry best practice recommendations to fix vulnerabilities

On-Demand & Scheduled Scans

scans can be performed on-demand when you need them or scheduled for routine scans based on your needs

CrowdStrike Integration

comprehensive vulnerability assessments and remediation capabilities

Cost

Free

Dollar sign with slash

Available To

Departments

Department Icon
Departments

IT Pros

IT Pro Icon
IT Pros

Getting Started

Request this service

Related Services

Information Technology Assessment
Risk Assessment
Server Protection & Threat Response
Computer Protection & Threat Response

Need Help?

FAQs

  • Contact Us
    •    FSU Service Status
    •   myFSU Service Center
    •   850-644-4357
    •  Chat
    •   M-F 8AM-5PM

  • Students
  • Faculty
  • FSU ITS
  •   Staff  
  •  IT Pros 
  •  Facebook
  •  Instagram
  •  Twitter
  •  YouTube
  •  LinkedIn

Information Technology Services · 1721 W Paul Dirac Drive · Tallahassee, FL 32310

© Florida State University
Tallahassee, FL 32306

FSU Directory Assistance
Questions or Comments

Privacy Policy
Copyright

  • Like Florida State on Facebook
  • Follow Florida State on Instagram
  • Follow Florida State on X
  • Follow Florida State on Youtube
  • Connect with Florida State on LinkedIn
  • More FSU Social Media

Cookie Preferences