CYBER SECURITY \ VULNERABILITY SCANNING
Internal Vulnerability Scanning
Affordable, automated detection of vulnerabilities with reporting and remediation advice.
What Vulnerabilities are lurking on your network?
Hackers work tirelessly to find vulnerabilities in all types of hardware and software from PCs to printers to lights and HVAC. While misconfiguration and exceptions can also create vulnerabilities.
For organizations without Vulnerability Scanning these exploits often go unresolved and may used by hackers during a Cyber Attack.
In today’s hostile cyber world, regular Vulnerability Scanning has become a “must-have/must do” part of every cyber security plan.
Don’t ignore vulnerabilities, let us help you discover and remediate them.
Discovery of Vulnerabilities is on the rise.
There were 18325 new Vulnerabilities detected in 2020 alone.
Many new Vulnerabilities are high risk
57% of vulnerabilities were classified as being ‘critical’ or ‘high severity’
(Redscan)
Most Vulnerabilities don’t need users
68% of Vulnerabilities require no user interaction to exploit
(Redscan)
The NIST Cyber Security Framework recommends that vulnerability scans be run at least quarterly, regardless of network size or type.
How It Works
Our Vulnerability Scanning solution is fast to deploy, affordable and light-weight.
Scans on your Network
A Data Collector (scanner) is installed and scans your network for known vulnerabilities at regular intervals.
Scan Data is Processed
Scan data is uploaded and processed against a database of known vulnerabilities. (updated daily)
Web-based Dashboard
View, prioritize and get more information about vulnerabilities through the web-based dashboard.
Notifications & Reporting
You are sent notification emails each time a new vulnerability is discovered. Detailed Reports can be emailed or archived for compliance.
Vulnerability Remediation Options
Vulnerabilities were detected, now what? Remediate vulnerabilities in the way that makes sense for you.
Self-Managed (DIY)
You are in control. Once the solution is deployed you remediate any vulnerabilities that come up on your own.
Assisted
We can provide Cyber Security experts to remediate vulnerabilities for you as needed on a case-by-case basis.
Managed
For organizations with no in-house IT staff we can automatically remediate any discovered vulnerabilities for you.
Vulnerability Scanning
Affordable, automated vulnerability scanning that detects known vulnerabilities and provides simple to follow remediation advice.
Detection
Scan Options
Exceptions
Notifications
Web Dashboard
Reporting
Detection
Scans your network to detect known vulnerabilities
Actionable information is provided for every discovered vulnerability, including:
A summary of the specific weakness associated with the vulnerability
All nodes affected by the vulnerability (when filtering by risk type)
Potential impact of a successful exploitation of the risk
Recommended solution
Additional information and insights about the particular vulnerability
How the vulnerability was detected
Scan Options
Can be scheduled to run daily, weekly, monthly or quarterly
Configure multiple schedules if needed
Different scan types can be set for each schedule
Fast scan - low impact scan that checks all standard port ranges and excludes brute force log-in attempts.
Standard scan - Significantly expands ports scanned and includes brute force log-in attempts.
Comprehensive scan - Scans every single port on every device in the selected IP range, looking for vulnerabilities and attempted brute force log-ins.
Exceptions
Nothing is more disruptive to vulnerability management than the “noise” created by false positives — situations you are aware of and don’t need or want those specific notifications.
Easy-to-use rules engine that ignores specific vulnerabilities
Apply the rule to a specific OID or device or any combination
Specify a start and stop date, if desired to “snooze” a vulnerability
Notifications
Once a scan is complete, the Vulnerability Scanner generates and sends an email alert to everyone on your notification list.
Choose from a comprehensive alert with all the details of everything discovered, or a summary alert which is filtered by issue or device.
You’ll also get notified in the event that the scan fails for any reason.
Web Dashboard
Single Endpoint security solution to support all your workstation and servers.
View all scan results and drill into more detail in our web-based dashboard
Filter by Issue, Device, or Date range.
Search based on text in the vulnerability name.
Easily identify the highest-risk issues.
Vulnerability Assessment Report
Vulnerability Scan Assessment Reports can be scheduled.
Reports can be emailed to you or any recipient
Reports can be saved to your happier IT Report Vault as evidence of compliance to a wide range of IT security standards.
Data Collector (Scanner) Requirements
There is no limitation on the number of Data Collectors (scanners) you can use. If you have a number of remote branches, a large network, or a distributed network, you can have as many data collectors as necessary at no extra charge.
1x Data Collector required per organization
1x Data Collector recommended per location
Scan effectiveness can be impacted over VPN
Data from all Collectors is merged in the console / reports
Data Collector available as a Virtual Appliance (no charge) or as a physical appliance.
Virtual Appliance Minimum Requirements
2-core i5 or Xeon processor (4 cores recommended for larger sites)
6GB RAM
40GB of diskspace
Identify and Resolve Vulnerabilities
Detecting and staying on-top of vulnerabilities is as easy as 1, 2, 3
Step 1
Schedule a Call
During a short call we will review pricing, answer any questions you have and get your account set up.
Step 2
Install Software
We will work with you to install our software on all of your devices and configure any required exceptions
Step 3
Enjoy Decreased Cyber Risk
Begins scanning your network for vulnerabilities as needed or on a schedule.
Click Here