CYBER SECURITY \ VULNERABILITY SCANNING

Internal Vulnerability Scanning

Affordable, automated detection of vulnerabilities with reporting and remediation advice.

 

What Vulnerabilities are lurking on your network?

Hackers work tirelessly to find vulnerabilities in all types of hardware and software from PCs to printers to lights and HVAC. While misconfiguration and exceptions can also create vulnerabilities.

For organizations without Vulnerability Scanning these exploits often go unresolved and may used by hackers during a Cyber Attack.

In today’s hostile cyber world, regular Vulnerability Scanning has become a “must-have/must do” part of every cyber security plan.

Don’t ignore vulnerabilities, let us help you discover and remediate them.

vulnerability-scanner-screenshot.png

Discovery of Vulnerabilities is on the rise.

There were 18325 new Vulnerabilities detected in 2020 alone.

(CVE Details)

Many new Vulnerabilities are high risk

57% of vulnerabilities were classified as being ‘critical’ or ‘high severity’

(Redscan)

Most Vulnerabilities don’t need users

68% of Vulnerabilities require no user interaction to exploit

(Redscan)

The NIST Cyber Security Framework recommends that vulnerability scans be run at least quarterly, regardless of network size or type.

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY

How It Works

Our Vulnerability Scanning solution is fast to deploy, affordable and light-weight.

Scans on your Network

A Data Collector (scanner) is installed and scans your network for known vulnerabilities at regular intervals.

Scan Data is Processed

Scan data is uploaded and processed against a database of known vulnerabilities. (updated daily)

Web-based Dashboard

View, prioritize and get more information about vulnerabilities through the web-based dashboard.

Notifications & Reporting

You are sent notification emails each time a new vulnerability is discovered. Detailed Reports can be emailed or archived for compliance.

Vulnerability Remediation Options

Vulnerabilities were detected, now what? Remediate vulnerabilities in the way that makes sense for you.

Self-Managed (DIY)

You are in control. Once the solution is deployed you remediate any vulnerabilities that come up on your own.

Assisted

We can provide Cyber Security experts to remediate vulnerabilities for you as needed on a case-by-case basis.

Managed

For organizations with no in-house IT staff we can automatically remediate any discovered vulnerabilities for you.

Vulnerability Scanning

Affordable, automated vulnerability scanning that detects known vulnerabilities and provides simple to follow remediation advice.

Detection

Scan Options

Exceptions

Notifications

Web Dashboard

Reporting

 

Detection

 
  • Scans your network to detect known vulnerabilities

  • Actionable information is provided for every discovered vulnerability, including:

    • A summary of the specific weakness associated with the vulnerability

    • All nodes affected by the vulnerability (when filtering by risk type)

    • Potential impact of a successful exploitation of the risk

    • Recommended solution

    • Additional information and insights about the particular vulnerability

    • How the vulnerability was detected

vulnerability-scan-details.png

Scan Options

 
  • Can be scheduled to run daily, weekly, monthly or quarterly

  • Configure multiple schedules if needed

  • Different scan types can be set for each schedule

    • Fast scan - low impact scan that checks all standard port ranges and excludes brute force log-in attempts.

    • Standard scan - Significantly expands ports scanned and includes brute force log-in attempts.

    • Comprehensive scan - Scans every single port on every device in the selected IP range, looking for vulnerabilities and attempted brute force log-ins.

vulnerability-scanner-schedule.png

Exceptions

 

Nothing is more disruptive to vulnerability management than the “noise” created by false positives — situations you are aware of and don’t need or want those specific notifications.

  • Easy-to-use rules engine that ignores specific vulnerabilities

  • Apply the rule to a specific OID or device or any combination

  • Specify a start and stop date, if desired to “snooze” a vulnerability

vulnerabilty-scanning-false-positive-management.png

Notifications

 
  • Once a scan is complete, the Vulnerability Scanner generates and sends an email alert to everyone on your notification list.

  • Choose from a comprehensive alert with all the details of everything discovered, or a summary alert which is filtered by issue or device.

  • You’ll also get notified in the event that the scan fails for any reason.

vulnerability-scan-email-notification.png

Web Dashboard

 

Single Endpoint security solution to support all your workstation and servers.

  • View all scan results and drill into more detail in our web-based dashboard

  • Filter by Issue, Device, or Date range.

  • Search based on text in the vulnerability name.

  • Easily identify the highest-risk issues.

vulnerability-scan-reporting.png

Vulnerability Assessment Report

 
  • Vulnerability Scan Assessment Reports can be scheduled.  

  • Reports can be emailed to you or any recipient

  • Reports can be saved to your happier IT Report Vault as evidence of compliance to a wide range of IT security standards.

vulnerability-scan-report.png

Data Collector (Scanner) Requirements

 

There is no limitation on the number of Data Collectors (scanners) you can use. If you have a number of remote branches, a large network, or a distributed network, you can have as many data collectors as necessary at no extra charge.

  • 1x Data Collector required per organization

  • 1x Data Collector recommended per location

    • Scan effectiveness can be impacted over VPN

  • Data from all Collectors is merged in the console / reports

  • Data Collector available as a Virtual Appliance (no charge) or as a physical appliance.

  • Virtual Appliance Minimum Requirements

    • 2-core i5 or Xeon processor (4 cores recommended for larger sites)

    • 6GB RAM

    • 40GB of diskspace

Identify and Resolve Vulnerabilities

Detecting and staying on-top of vulnerabilities is as easy as 1, 2, 3

Step 1

Schedule a Call

During a short call we will review pricing, answer any questions you have and get your account set up.

Step 2

Install Software

We will work with you to install our software on all of your devices and configure any required exceptions

Step 3

Enjoy Decreased Cyber Risk

Begins scanning your network for vulnerabilities as needed or on a schedule.

Click Here