SaaS Vulnerability Scanner

Secure your network perimeter

Our SaaS Vulnerability Scanner accumulates the power of software discovery that runs on your Internet facing hosts and vulnerability intelligence. We use passive fingerprinting techniques to detect software and its version, running on a particular port, as well as supported functionality. This approach allows us to reliably detect and report critical vulnerabilities, misconfigured services or dangerous applications facing the Internet within your infrastructure. Furthermore, your systems will not suffer service disruptions during vulnerability scans as our passive fingerprinting techniques do not require usage of dangerous exploits. During the scan we will not trigger memory corruption, excessive resources consumption or assertion failures and still will be able to detect if your service is vulnerable to such threats.

Why network perimeter scanning is important

Every company has at least one device facing the Internet – the office router. If compromised, an adversary may gain unrestricted access to your local office network and corporate intelligence. In order to defend from this, your office router should be scanned from outside your network to determine if there is a way for intruders to compromise it. All router and management ports should not be accessible via the Internet and its firmware should be up-to-date.

Your company may also have a web or mail server. Remote access solutions for employees outside the office, PBX systems to call your clients. These are critical company resources that should be protected and function properly, as any malicious activity against them may cause significant money loss and reputation damage to the entire business.

SaaS Vulnerability Scanner is a cost-effective 24/7 solution for real time security monitoring of your network perimeter and reliable vulnerability intelligence.

  • Vulnerability scanning
  • Hybrid approach
    (human & machine learning)
  • Up-to-date vulnerability database & exploits
  • Safe fingerprinting detection
  • 24/7 monitoring
  • Threat Intelligence
  • Automated analysis
  • Real-time threat detection
  • 24/7 monitoring of media and social networks

What is vulnerability intelligence?

Knowledge of security vulnerabilities, their tracking, analyzing, and mitigation is called vulnerability intelligence. This information comes from various sources, such as security researchers, software vendors or just enthusiasts.

In 2017 we analyzed more than 20 000 security vulnerabilities, reported by different sources. On average, this means around 55 vulnerabilities per day. It’s impossible to go through such volume of data unless you have your own team of security analysts.

SaaS Vulnerability Scanner can help you detect, manage, prioritize and fix vulnerabilities within your network infrastructure.

How to start using SaaS Vulnerability Scanner?

The entire registration process takes about one minute of your time. Once your account is created, you will be automatically redirected to your Security Operations Centre (SOC) interface, where you can add your hosts and immediately start security assessment process.

  • Fast and easy registration

  • Immediate access to vulnerability scanner

  • No credit card validation for trial access

  • 24/7 technical support