View
Sorting
Products found: 79
6Scan
What Does 6Scan Do?
- Find. The 6Scan six independent scanners work to detect vulnerabilities, scan for malware and inspect your website's files to determine any security issues or risks.
- Fix. Patent-pending technology automatically fixes any security issues as soon as they are detected. We deploy a WAF (Web Application Firewall) and custom vulnerability patches to make sure any attack vectors are blocked. The entire process of detecting and fixing vulnerabilities is fully automated, managed through a unified dashboard.
- Protect. 6Scan will continue to monitor your site for new vulnerabilities and security risks. The scanning is scheduled automatically or can be triggered manually and you will be notified of any issues. As with all our services, this process can be monitored from your dashboard where you have the opportunity to roll back any changes.
Acunetix Vulnerability Scanner
- Detects over 4500 web application vulnerabilities.
- Scan open-source software and custom-built applications.
- Detects Critical Vulnerabilities with 100% Accuracy.
- DeepScan Technology – for crawling of AJAX-heavy client-side Single Page Applications (SPAs).
- Industry’s most advanced SQL Injection and Cross-site Scripting testing – includes advanced detection of DOM-based XSS.
- AcuSensor Technology – Combines black box scanning techniques with feedback from its sensors placed inside source code.
- Highest detection of WordPress vulnerabilities – scans WordPress installations for over 1200 known vulnerabilities in WordPress’ core, themes and plugins.
- An easy to use Login Sequence Recorder that allows the automatic scanning of complex password protected areas.
- Review vulnerability data with built-in vulnerability management. Easily generate a wide variety of technical and compliance reports.
Aegify RSC Suite
Aegify RSC Suite
- Reduced risk
- Unified/integrated approach
- Lower total cost of ownership
- Oversight ease
- Maximum security
- No compliance tradeoffs
The NEED
RISK management is not optional for healthcare, retail and financial organizations.When SECURITY breaches happen, critical data is compromised, jobs are lost and profits disappear. Managing the regulatory maze is challenging. PCI, ISO and SANS 20 COMPLIANCE is best practice. HIPAA, GLBA and FISMA COMPLIANCE is the law. Risk, security and compliance (RSC) protection is complex and cumbersome. Until now. Discover the effective simplicity of a unified RSC solution. Discover Aegify.
- Aegify RSC Suite includes:
- Aegify Risk Manager
- Aegify Security Manager
- Aegify Compliance Manager
- Aegify Integrity Manager
UNIFIED APPROACH
For management ease and cost reduction, most healthcare providers and business associates prefer a unified Risk, Security and Compliance solution. Consider these diagnostic questions:- Are you confident your vendors and business associates are compliant with all regulations?
- Are burdens of compliance forcing you to take calculated risks due to resource constraints?
- Do you have multiple siloed solutions that cause integration, management and financial headaches?
- If your answers are mostly “yes,” consider Aegify RSC Suite
Diagnose
Within hours, you will know:- Your total organizational risk including your risk from each of your vendors and business associates
- Where your security threats lie
- What curative measures need to be undertaken
- Your compliance status with HIPAA, Meaningful Use, HITECH, PCI, ISO, SANS 20 and all other regulations and standards
Cure
Follow Aegify instructions to:- Minimize organizational risk
- Close your risk, security and compliance gaps
- Comply with all applicable regulations and standards
Protect
24/7 continuous monitoring program will:
- Reduce all risk… today and tomorrow
- Diagnose and cure future security threats in real time
- Comply with all applicable current and future regulations
WHY AEGIFY?
Aegify was founded on a simple set of guiding principles:
- RSC services are too siloed, complicated and expensive
- The market needs a holistic RSC solution that diagnoses, cures and prevents future catastrophic events from occurring
Today, the Aegify Suite is a unique unified solution that operates at the intersection of security, compliance and risk management for healthcare, retail and financial organizations.
For those that don’t need a unified RSC Solution, each individual Aegify Manager product is a robust standalone solution.
Alcide Kubernetes Advisor
- Kubernetes infrastructure vulnerability scanning
- Hunting misplaced secrets, or excessive priviliges for secret access
- Workload hardening from Pod Security to network policies
- Istio security configuration and best practices
- Ingress Controllers for security best practices
- Kubernetes API server access privileges
- Kubernetes operators security best practices
- Deployment conformance to labeling, annotating, resource limits and much more
AMT - Banking Malware Detector
The AMT Technology Website
The AMT (Agentless anti-Malware Technology) is a new proprietary Minded Security technology for detection and management of malware software. AMT has been developed after years of study for detecting and managing in real time advanced banking malware for our customers online users. The core engine is a JavaScript Analyzer written by renowned JavaScript experts specialized in advanced JavaScript security research. Various innovative analysis technique have been used in AMT such as Trusted JavaScript Modeling combined with optimized WebInject differential analysis.The product: AMT Banking Malware Detector
The AMT Banking Malware Detector is a sophisticated security platform for detecting and managing advanced malware on your online banking customers in real time. AMT Banking Malware Detector instantly recognizes all new malwares that have been installed on users' computer interacting with your Internet Banking Web Site. The technology is able to detect all types of banking malwares, with a focus on targeted malware specifically designed to attack a particular bank.Key Features:
- Agentless: does not install anything on user’s computer.
- Transparent: does not alter the user experience.
- Proactive detection: detects malware not known yet.
- Easy Setup: installation and tuning in just a few days.
- Available in both modes cloud and appliance.
Performance
No degradation in the performance of the bank infrastructure: no need to install new infrastructure components.
Light Deployment: for portals with millions of users does not require significant additional infrastructure.
- Fraud Risk Management
The technology reduces risk of infected users preventing frauds.
Can be easily managed by the bank's internal anti-fraud team through the innovative HTML5 interface.
- Easy Management
The product is easy to install with a single JavaScript source for multiple sites. No need to install new infrastructure components (no impact on Business Continuity).
Easy to manage with AMT control panel and AMT daily reports.
- Customization
It is designed to integrate with any anti-fraud systems with the ability to customize the modular components such as GUI, API, and specific components.
Ability to create ad hoc components for malware detection.
Why choosing AMT?
The key point of the AMT Banking Malware Detector is the new proactive approach.
AMT creates a model of Custom Signature Engine (CSE) for each online banking service.
The CSE permits to perform a continuous comparison with the mutations and to identify in real time a new threat.
AMT Banking Malware Detector allows to identify malware victims before they will be defrauded.
AppSpider
BitDam
- Close to zero latency – With minimal email latency of just a few seconds, end-users will not notice any change. With BitDam, they’re safe to click everything that lands in their inbox.
- 2-click integration – Pre-built APIs enables a (literally) 2-click self-service deployment through the BitDam portal, which applies for all mailboxes in the organization.
- Fast and easy deployment – No MX record change is needed, no hassle to your IT team.
- Intuitive dashboard – Your SOC team can view email subject and recipients through the BitDam dashboard, making tracking and investigating attacks simple.
- Email body and clean files are never saved – BitDam scans the entire email including links and attachments, but doesn’t save it unless malicious.
- Quarantine malicious emails – Malicious emails are automatically quarantined, allowing the SOC team to investigate, delete or release them as needed.
- Visibility to other security checks – As a SOC team user you can see what basic security checks each email went through. This includes anti-spam, spf, and dmarc checks.
- Cloud Storage
- Instant Messaging
Blade Tool Output Integration Framework
- CppCheck
- RATS
- Splint
- SpotBugs
- Jlint
Blade TOIF Integration
Integrates into Eclipse development environment:- Execute Blade TOIF (desktop deployment) from within Eclipse with progress bar
- Automatically see defect findings in Eclipse
- Use the “TOIF Analyze” easy button in the Eclipse toolbar and in the Blade TOIF main menu
- Run it on a sub-set of project files/ directories
- Filter the defect findings listed in the Blade TOIF Findings view, based on the selected project data in the Project Explorer in Eclipse
Blade TOIF Key Capabilities
- Integrates multiple vulnerability detection tools and their findings as “data feeds” into a common repository
- Addresses wider breadth and depth of vulnerability coverage
- Common processing of results
- Normalizes and collates “data feeds” based on discernable patterns described as Software Fault Patterns (SFPs) and CWEs
- Provides one prioritized report with weighted results across tools/vendors
- Uses an RDF repository and provides external Java API for additional analysis capabilities
- Integrates out-of-box with: CppCheck, RATS, Splint, SpotBugs and Jlint
- Defect Description view provides information related to the cluster, SFP, and CWE description of the selected defect instance in the Blade TOIF Findings view
- Defect findings, including citing information, can be exported to *.tsv file and subsequently imported to another Blade TOIF project
- Installation wizard, auto-detection and configuration of open source software (OSS) static code analysis (SCA) tools
- Supports load build integration to import results generated from the server/load build to the desktop
- Automated risk analysis
- Automated vulnerability detection and analysis
- Traceability
- Measurement and prioritization that make it easy to plan how to best leverage the risk management budget and resources for greatest impact
Bright Security DAST Platform
BufferZone
- Virtual Container: A secure, virtual environment for accessing content from any potentially risky source including internet browsers, removable media and e-mail.
- Secure Bridge: A configurable process for extracting data from the container to enable collaboration between people and systems while ensuring security and compliance.
- Endpoint Intelligence: Detailed reporting and integration with SIEM and Big Data analytics to identify targeted attacks.
- Containment Features. Prevent uncontained applications, which can access organizational resources, from accessing the internet; and prevent contained applications, which can access the internet, from accessing organizational resources.
- Hidden Files. Set file locations, that may contain sensitive data, to be hidden from contained applications.
- Upload Blocker. When Upload Blocker is enabled, contained browsers can download to and upload from only a designated folder (by default: Downloads), which is isolated from uncontained programs. This prevents browsers from uploading any files to the internet other than contained files that were previously downloaded from the internet.
CORE Security
Introducing CORE Security
When it comes to securing your cloud, you need to peace of mind that security’s at the core of your hosted infrastructure. That’s why we’ve put together three ServerChoice CORE Security™ packages, with varying levels of protection, so you can get best-fit cyber security for your organisation.CORE Base
- Two-factor authentication
- TrendMicro anti-virus & malware protection
- Vulnerability scanning: Unmanaged Quarterly
- System hardening
- Next-generation firewall
- Advanced DDoS mitigation: Standard (20 Gbps)
CORE Enterprise
- Two-factor authentication
- TrendMicro anti-virus & malware protection
- Vulnerability scanning: Unmanaged Monthly
- System hardening
- Next-generation firewall
- File integrity monitoring
- Advanced DDoS mitigation: Enhanced (250 Gbps)
- 24/7 SIEM services
CORE Platinum
- Two-factor authentication
- TrendMicro anti-virus & malware protection
- Vulnerability scanning: Managed Monthly
- System hardening
- Next-generation firewall
- File integrity monitoring
- Advanced DDoS mitigation
- Pro (Terabit+)
- 24/7 SIEM services
- Intrusion Prevention System (IPS)
Bolt-on CORE Security™ Services
In addition to the above security packages, we offer a range of additional security enhancements to deliver maximum protection from cyber threats:- Data loss prevention (DLP)
- Web application firewalls (WAF)
- Penetration testing
- URL filtering (Virtual Desktops only)
- Email spam filtering and antivirus (Exchange only)
- Compliance consultancy
Curtail Security ReGrade
- Verifies quality of software upgrades and patches using real production traffic
- Prevents costly rollbacks and cumbersome staging
- Enables regression testing in development, QA, and production
- Spots differences in content, metadata, application behavior and performance
- Speeds debugging with packet capture and logging
CyBot
Save time & money
Increase security by focusing on remediating vulnerabilities that are a part of a validated attack path to a business process or critical assetKey features:
- Creates actionable insights based on critical vulnerabilities that threaten your business process for immediate alerts and remediation with one click
- Continuous silent vulnerability scanning on all IP based devices on premise or in the cloud
- Automatically detects critical assets and finds how hackers could reach and threaten them, no human involvement required.
- Cronus is certified for Penetration Testing by CREST
- Help comply with GDPR –require regular pen testing, vulnerability management and greatly reduces the risk of breach to your sensitive data.
Which CyBot is right for me?
CyBot is a next-generation vulnerability management tool as well as the world’s first Automated pen testing solution, that continuously showcases validated, global, multi-vector, Attack Path Scenarios ™ (APS), so you can focus your time and resources on those vulnerabilities that threaten your critical assets and business processes. CyBot has one core engine: CyBot Pro, plus two additional management consoles. One for Enterprises and one for MSSPs. CyBot Pro is the workhorse of the product suite. It is a patented autonomous machine-based penetration test which initially scans the networks, its assets, its vulnerabilities and then takes the next step to map out and validate all the routes a hacker could take to reach your critical assets and business processes. Much like the process a human penetration tester would follow, but continuously and at a much larger scale and scope. CyBot Enterprise manages several CyBot Pros. This is great for larger organizations with global networks who wish to gain insights on global Attack Path Scenarios ™ between their branches, each using a different CyBot machine. CyBot Enterprise will aggregate information from all CyBot Pros for in-depth global insights on cyber threats to your business processes. CyBot MSSP provides large managed security service providers with full control of their Enterprise customers, each with their various CyBot Enterprise and CyBot Pro accounts. Schedule their scans, get alerts to your SIEM and much moreCybraics nLighten
- Detect unknowns
- Improve Efficiencies
- Lowest TCO
CyCognito platfrom
Manage Your Attack Surface
The CyCognito platform helps you identify all of the attacker-exposed assets in your IT ecosystem for a complete view of your attack surface. With its comprehensive global botnet, the CyCognito platform uniquely reveals unknown and unmanaged assets associated with your organization – including those in cloud, partner and subsidiary environments – that are critical to your cybersecurity risk management. In fact, CyCognito helps organizations identify 30 to 300% more assets than they knew existed prior to using the CyCognito platform.Prioritize and Eliminate Attack Vectors
The CyCognito platform helps you eliminate critical attack vectors with a continuously updated and prioritized view of your attacker-exposed IT ecosystem. You and your security team can use the CyCognito platform to pinpoint critical risks just as attackers do. Organizations that still have to perform legacy external testing to meet customer agreements or compliance regulations use the CyCognito platform to augment and optimize those processes by focusing the legacy tests on the areas of greatest risk that the CyCognito platform has identified.Monitor Subsidiary Risk
The CyCognito platform gives you immediate visibility of the security posture of your subsidiaries and organizations you are evaluating for merger or acquisition. It identifies their attack surfaces and the effectiveness of their security controls, without requiring any deployment or configuration.
Global Bot Network
CyCognito’s Global Bot Network uses attacker-like reconnaissance techniques to scan, discover and fingerprint billions of digital assets all over the world. No input or configuration needed.
Asset Mapping
- Web applications
- Keyword and code fragments
- Logos and icons
- Deployed software
- TLS configuration
- IP ranges
Multi-Vector Attack Simulator
Using CyCognito’s proprietary risk-detection methods, the attack simulator identifies risks per asset and discovers potential attack vectors. It doesn’t affect business operations and works without deployment, configuration or whitelisting.
SECURITY MODULES
Public Techniques:
Vulnerability assessment
Encryption analysis
Proprietary Techniques:
Authentication testing
Misconfiguration detection
Network design analysis
Data exposure detection
Code injection risks
Protecting Your Organization from Shadow Risk
Explore the different ways CyCognito helps take your cybersecurity risk out of the dark.- Completely External
Operates externally and continuously in the cloud, with no impact on business continuity.
- Configuration Free
No need for software deployment, integration or configuration. It just works immediately, out of the box.
- Runs Automatically
Works independently across your organization’s environment, without affecting operations.
CyOPs Platform
Incident Management
Distinguishing Real Threats From Endless Alerts
Real threats are often overlooked, largely as a result of the copious amount of alert notifications that accumulate daily. CyOPs Automated Intelligent Triaging enables Security Analysts to efficiently uncover these important alerts, prioritizing them based on severity, asset, intelligence, and frequency. To investigate alerts more efficiently, it’s very important to be able to understand and review data in a consumable manner. CyOPs Case Management solution understands the need to manage data effectively and provides options to:- Manage Alert and Incident Listings in a filter-able grid view
- Ability to add mini-dashboards on each grid to gain visibility into the bigger picture and understand trends
- Ability to define new modules, unlike any other SOAR offering- with customization of modules such as fields, views, and permissions
- Visual layout editor to define custom views, data models, fields, and grids
CyOPs for MSSPs
Integrate All Your Security Tools
Enterprise-level SOCs leverage a multitude of products and tools to effectively resolve incidents and fulfill compliance requirements. CyOPs caters to our clients’ specific environment needs due to the customizability of product, which results in greater efficiency, eliminated alert fatigue, and maximizes their ROI. The CyOPs Integrations Repository has over 280 available integrations, enabling users to automate their entire security stack behind a single pane of glass.A unified console built on the only enterprise multi-tenancy architecture.
- Obtain a complete overview of all your customers (tenants) in a single unified CyOPs master console.
- Filter views by customers, to understand the customer’s current state
- Assign and adhere to the Roles and Permissions assigned to each tenant
- Create customer specific alert and incident views
- Robust and scalable architecture for load-balancing usage
Role Based Custom Dashboards
Insight From Multiple Perspectives
CyOPs offers customers enterprise dashboards enabling better decision making.- Choose from multiple canned dashboards from multiple perspectives
- Export and import dashboard templates
- Export dashboard views as PDFs
Full Role-Based Access Control
- Assign multiple roles to each dashboard to control visibility across the team.
- Ability to assign roles and permissions to dashboard templates
- Ability to make selected dashboards as default for all system users
- Ability to create user-specific dashboards and reports
Reporting
Library of Out-of-the-box Reports
- Leverage the CyOPs Report Library for a quick start with many commonly used reports
- Use ready-made reports like Incident Closures, Alert Closures, IOC Summaries etc.
- CyOPs Support Portal using Report Import functionality
- Customize out-of-the-box reports for organization-specific metrics
- Export Reports in CSV & PDF Formats
Queue Management
Create Dedicated Queues
Leverage the built-in CyOPs Queue Management to handle automatic work assignments across multiple queues and teams- Create multiple queues across multiple teams
- Add multiple team members to each Queue
- Define logical rules for auto assignments to a specific member or team
- Option to add work tasks manually to any queue
Manage SOC Shift Change With Ease
Streamline SOC Team Onboarding & Management
CyOPs™ enables new SOC team members to start making an impact right away due to its ease of use and ability to retain information from previous employees. Standardized trackable and repeatable processes result in a more efficient onboarding plan for new SOC team members. Create standard automated response processes using the most versatile enterprise drag-and-drop CyOPs Playbook builder that not only retains team knowledge but also shortens incident response times. Maximize your team and security stack with CyOPs™ automation.- SOCs that work in multiple shifts perfects shift changeovers with ease
- Create multiple queues for different shifts
- Define rules for assigning alerts and incidents based on the timezone
- Obtain snapshots of a shift’s queue to better understand task status
- Option to add manual tasks to any queue or team member
ERPScan Smart Cybersecurity Platform
Detect
- Collect all the logs generated in your SAP system
- Detect 0-day and 1-day attacks with the help of machine learning
- Analyze user behavior and detect anomalies
Assess
- Understand your assets
- Schedule security checks
- Identify vulnerabilities, misconfigurations, customization issues, and SoD violations
Monitor
- Check compliance
- Monitor all connections between systems with the Threat Map
- Review security posture with high-level role-tailored dashboards
- Get all the necessary security information with the help of the search engine
Prevent
- Automate code correction
- Generate virtual patches on the fly
- Export 0-day signatures to IDS/IPS system
Respond
- Track changes between scans
- Receive notifications
- Create incidents in external Incident and Task Management systems
Key benefits:
- Perform industry-specific checks
- Cover all areas of SAP security
- Report on the security posture to the management
- Save time and reduce the costs of compliance
- Simplify vulnerability management
Faraday Platform
Plugins
You feed data to Faraday from your favorite tools through Plugins. Right now there are more than 70+ supported tools. There are three Plugin types: console plugins which intercept and interpret the output of the tools you execute, report plugins which allows you to import previously generated XMLs, and online plugins which access Faraday's API or allow Faraday to connect to external APIs and databases. Supporting output from +70 tools, Faraday Platform centralizes all your efforts and gives sense to your main objectives. Providing powerful Automation Technology, it helps you reduce your findings’ life cycle by prioritizing actions and decreasing the exposure time of your assets, promoting collaboration by allowing big and small groups of people to work together. Plus, get deep insight on all your projects with just a couple clicks.Key features
Custom Implementation. No infrastructure changes needed: implement Faraday On-prem, Cloud or Hybrid without network changes. Flexible Integrations. Import output or results from 3rd party tools and synchronize your ticketing systems (JIRA, ServiceNow) and security enhancements (2FA, LDAP) Workflows. Implement custom events by triggering actions or vulns' content in real time Deduplicate Vulns. Faraday's Global Vuln KB allows you to customize descriptions and apply them accordingly. Agents. Define and execute your own actions from different sources and automatically import outputs into your repository. Scheduler. Automate repetitive Agents' actions and check results on your Dashboard. Graphics. Get a visual representation of all your findings with just one click. Faraday Client. Solution’s shell allows you to upload results while pentesting actively. Methodology and Tasks. Setup your own strategy, assign tasks to users for each phase and easily follow them up.Choose the plan that best: fits your needs
Community Faraday supports the InfoSec Community around the globe by offering a free open source version that improves on daily workflows- Feed data to Faraday from your favorite tools
- Divide projects by your own rules
- Customize your instance
- Easily identify and sort your database
Craft and export projects using your own templates
Plan ahead and keep track of your goals
- Prioritize actions, decreasing exposure time for your assets
- Adapt strategies to customize every phase of your projects
- Integrate everything!
Frontline.Cloud
The Frontline.Cloud™ Systems
Frontline Vulnerability Manager (Frontline VM) is the industry’s most comprehensive, accurate, and easy to use VM platform – bar none. Frontline VM comprehensively identifies and evaluates the security and business risk postures of network devices and applications deployed as premise, cloud, or hybrid network-based implementations. Now residing entirely in Amazon Web Services (AWS), Frontline VM easily addresses the security compliance requirements of organizations around the globe. Competitors’ vulnerability management software solutions may have, in fact, reached “commodity” stature – being milked for cash at the expense of continued R&D investment. Nothing could be further from the truth for Frontline VM. Frontline Active Threat Sweep (Frontline ATS), an agentless system, enhances your existing defense-in-depth coverage by uncovering gaps in your present endpoint protection, active threats and indicators of compromise. Digital Defense’s Frontline Active Threat Sweep™ (Frontline ATS™) complements your existing endpoint protection technologies providing an agentless, easy to deploy method to quickly and reliably analyze assets for active threat activity and indications of compromise. Enhance your existing defense-in-depth coverage by uncovering gaps in your existing protection. Pinpoint which assets have no endpoint protection installed or that are out-of-sync and out-of-date leaving one or more assets at risk. Frontline ATS enables organizations interested in threat hunting to deploy a threat detection capability on top of Digital Defense’s proprietary technology architecture that is lightweight and effective, to gain instant visibility into assets that demonstrate indications of compromise. Frontline Web Application Scanning (Frontline WAS) has been developed to provide the highest level of dynamic web application testing results through a system that is easily deployed and maintained. Frontline Web Application Scanning™ (Frontline WAS™), a Frontline.Cloud SaaS security system, is housed in Amazon Web Services and has been developed to provide the highest level of dynamic web application testing results through a system that is easily deployed and maintained. Enjoy the benefits of a technology you can trust to deliver unparalleled accuracy with minimal consumption of resources. Underpinned by DDI NIRV™, Digital Defense’s patented scanning technology, Frontline WAS overcomes frustrations experienced by security professionals such as the lack of accurate results and complexity found in deploying other web application scanning tools.- Easy deployment and configuration
- High level dashboards at the scan level and a per web application to easily expose overall security postures at various levels
- “Blind Spot” coverage commonly missed by other web application assessment technologies
- Prioritization of the most critical vulnerabilities, saving organizations valuable resources through targeted remediation efforts
- Tracking of and trending on new, recurred and fixed vulnerabilities
- Intuitive results navigationActive View – web application scan data management across all web application scan activities
- Robust filtering – providing the data and views you want instantly
- Dynamic reporting / visualization including OWASP Top 10
- Frontline Security GPA® trending that offers a dynamic view of your security posture
- Ability to compare Frontline VM and WAS Asset Ratings automatically, with no manual intervention required
GFI LAN Guard
Patch management: Fix vulnerabilities before an attack
Patch management is vital to your business. Network security breaches are most commonly caused by missing network patches. GFI LanGuard scans and detects network vulnerabilities before they are exposed, reducing the time required to patch machines on your network. GFI LanGuard patches Microsoft ®, Mac® OS X®, Linux® and more than 60 third-party applications, and deploys both security and non-security patches.Network auditing: Analyze your network centrally
GFI LanGuard provides a detailed analysis of the state of your network. This includes applications or default configurations posing a security risk. GFI LanGuard also gives you a complete picture of installed applications; hardware on your network; mobile devices that connect to the Exchange servers; the state of security applications (antivirus, anti-spam, firewalls, etc.); open ports; and any existing shares and services running on your machines.
Vulnerability assessment: Discover security threats early
More than 60,000 vulnerability assessments are carried out across your networks, including virtual environments, mobile and network devices. GFI LanGuard scans your operating systems, virtual environments and installed applications through vulnerability check databases such as OVAL and SANS Top 20. GFI LanGuard enables you to analyze the state of your network security, identify risks and address how to take action before it is compromised.
- Patch management across multiple operating systems. GFI LanGuard is compatible with Microsoft®, Mac OS X® and Linux®, operating systems, as well as many third-party applications. Scan your network automatically or on demand. Auto-download missing patches or roll-back patches.
- Integrates with third-party security app. GFI LanGuard integrates with more than 4,000 critical security applications, including: antivirus, anti-spyware, firewall, anti-phishing, backup client, VPN client, URL filtering, patch management, web browser, instant messaging, peer-to-peer, disk encryption, data loss prevention and device access control. It provides status reports and lists of instant messaging or peer-to-peer applications installed on your network. It also rectifies any issues that require attention such as triggering antivirus or anti-spyware updates.
- Know what’s happening on your network. GFI LanGuard's network auditing gives you a comprehensive view of your network – including connected USB devices smartphones and tablets, as well as installed software, open shares, open ports, weak passwords and any hardware information. Secure your network by closing ports, deleting obsolete users or disabling wireless access points.
- Network and software auditing. Security audits. The interactive dashboard provides a summary of the current network security status and a history of all relevant changes in the network over time. Drill down through information, from network-wide security sensors to individual security scan results.
- Manage reporting. Reports can be exported to popular formats like PDF, HTML, XLS, XLSX, RTF and CSV, and can be scheduled and sent by email. They can also be used as a template to create new custom reports and are fully re-brandable.
- Run agent-less or agent-based modes. GFI LanGuard can be configured to run in agent-less or agent-based mode. Agent technology enables automated network security audits and distributes the scanning load across client machines.
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.