7

Detecting Vulnerabilities with Expertise edgescan’s approach to cyber security can be compared in the following way: host/server TRADITIONAL VULNERABILITY SCANNING AUTOMATED VULNERABILITY SCAN essentials standard advanced HYBRID MANUAL MANUAL VERIFICATION PENETRATION TEST Leading #FullStack Vulnerability Management Continuous Asset Profiling: edgescan™ Continuous Asset Profiling is a feature for all edgescan licenses. With fast network host discovery and asynchronous port scanning to help you identify and monitor assets and network changes. Continuous Asset Profiling supports service and OS detection and can generate alerts based on what you need to know. Host/Server Security Assessment: Server Vulnerability Assessment covering over 90,000 CVE’s. Designed to help ensure your deployment, be it in the cloud or on premise, is secure and configured securely. All vulnerabilities are validated and risk rated by experts and available via the dashboard to track and report-on when required. PCI Compliance: Web Application Security Assessment: edgescan™ exceeds requirements of the PCI DSS by providing continuous, verified vulnerability assessments for both internal , public Internet facing websites and hosting environments. edgescan™ Advanced includes business logic and penetration testing required by the PCI DSS standard. edgescan™ integration with Web Application Firewalls (WAFs) supports the creation of virtual patches to fix vulnerabilities while providing the reports needed to pass auditor inspections. Validated web application security assessments on demand when you want them and scheduled as often as you need them. Recording of risk ratings, trending data and other metrics on a continuous basis, all available via our rich dashboard for superior security intelligence.

8 Publizr Home


You need flash player to view this online publication