PetraSolutions
   CISCOSITEHOME SWEET HOMEPAGE | INTERCESSION | MUSIC | UNIONJOKE | TRUELOVE | VEGETATION

Up ] Firewalls ] VPNs ] Intrusion Detection ] [ Scanning ] Access Control ] Policy Management ] Consulting Services ]

Scanning

Scanners conduct a detailed analysis of networked systems to compile an electronic inventory of the assets and detect vulnerabilities that could result in a security compromise. This technology is "proactive," providing prevention insight into your security posture and allowing you to fix security weaknesses before intruders can exploit them. Scanning is like conducting a periodic building walk-through to ensure that doors are locked and windows are closed. It helps you understand your risk.

Cisco Secure Scanner

Cisco Secure Scanner, formerly known as Cisco NetSonar™ software, scans networks and compiles a list of all the networked systems within a specified address range, their operating systems, and active services. It then compares that information against an extensive network vulnerability database and determines which systems have security weaknesses. After nonintrusively confirming the presence of those vulnerabilities, Cisco Secure Scanner presents the information in a variety of formats from tables, charts, and text reports to detailed recommendations for corrective action. The scanner allows users to measure security, manage risks, and eliminate security vulnerabilities on their networks.

Key Strengths / Features / Benefits

  • Ease of use — Because Cisco Secure Scanner is based on a simple, Widows-like format, and has an extensive database of terms and instructions for corrective action for each vulnerability it detects, customers do not have to be security experts to have security expertise.

  • Robust reporting — Cisco Secure Scanner has extensive reporting capabilities and communicates the vulnerability state of the network and each specific system in a variety of formats.

  • Pricing / licensing — For a fraction of the cost of competing systems, Cisco Secure Scanner completes a thorough audit of the network without requiring customers to relicense the product whenever their network expands or changes, or to license the product to a particular range of IP addresses.

  • Regular vulnerability updates — The unique rules language of the scanner removes the dependency of vulnerability updates and product releases, allowing customers to easily download new rules and exploits from the Cisco Web site on a routine basis.

E-Commerce ] LAN ] Security ] WAN ] Solusi ]

Back ] Up ] Next ]

   CISCOSITEHOME SWEET HOMEPAGE | INTERCESSION | MUSIC | UNIONJOKE | TRUELOVE | VEGETATION
Thanks for visiting! God bless you! Would you please sign my GuestBook?! Would you please view my GuestBook?! Personal Information. Open Me First! A ouvrir d'abord! Zuerst offnen! Da aprire subito! ˇAbreme Primero! Don't hesitate to send me your oppinions and suggestions. Just mail wisinss@yahoo.com.
You are visitor #### to be blessed in Petracom since May 14th, 2000. Visitors