|
[ Up ] [ Firewalls ] [ VPNs ] [ Intrusion Detection ] [ Scanning ] [ Access Control ] [ Policy Management ] [ Consulting Services ]
Scanning
Scanners conduct a detailed analysis of networked systems to
compile an electronic inventory of the assets and detect vulnerabilities that
could result in a security compromise. This technology is "proactive,"
providing prevention insight into your security posture and allowing you to fix
security weaknesses before intruders can exploit them. Scanning is like
conducting a periodic building walk-through to ensure that doors are locked and
windows are closed. It helps you understand your risk.
Cisco Secure Scanner
Cisco Secure Scanner, formerly known as Cisco NetSonar™
software, scans networks and compiles a list of all the networked systems within
a specified address range, their operating systems, and active services. It then
compares that information against an extensive network vulnerability database
and determines which systems have security weaknesses. After nonintrusively
confirming the presence of those vulnerabilities, Cisco Secure Scanner presents
the information in a variety of formats from tables, charts, and text reports to
detailed recommendations for corrective action. The scanner allows users to
measure security, manage risks, and eliminate security vulnerabilities on their
networks.
Key Strengths / Features / Benefits
-
Ease of use — Because Cisco Secure Scanner is
based on a simple, Widows-like format, and has an extensive database of
terms and instructions for corrective action for each vulnerability it
detects, customers do not have to be security experts to have security
expertise.
-
Robust reporting — Cisco Secure Scanner has
extensive reporting capabilities and communicates the vulnerability state of
the network and each specific system in a variety of formats.
-
Pricing / licensing — For a fraction of the cost
of competing systems, Cisco Secure Scanner completes a thorough audit of the
network without requiring customers to relicense the product whenever their
network expands or changes, or to license the product to a particular range
of IP addresses.
-
Regular vulnerability updates — The unique rules
language of the scanner removes the dependency of vulnerability updates and
product releases, allowing customers to easily download new rules and
exploits from the Cisco Web site on a routine basis.
[ E-Commerce ] [ LAN ] [ Security ] [ WAN ] [ Solusi ]
|