Continuous Vulnerability Scanning
2 minute read
What it does:
- Runs NVT scripts for each vulnerability against each network host to positively identify if the host is susceptible to specific threats.
- Vulnerability definition details are primarily based on Mitre CVE or Carnegie Mellon CERT databases.
How it works:
- Separate IT environment discovery tools identify client hostnames and IP addresses of on-premise, cloud, and SaaS resources.
- Internal network vulnerability scanning is possible via an existing AIS NMS deployment.
By default, NVT scripts that may cause outage by testing for disruptive vulnerabilities are disabled by default and can be configured to run during an established maintenance window or on-demand. Scan frequency and report generation is also configurable.
See what’s important before it becomes urgent. The AIS Network Monitoring System that tracks performance, reliability, and configuration metrics for on-premise and cloud devices and applications. Included tools for Central Administration, Remote Management, Network Typology Insights, In-Depth Monitoring, and Faster Troubleshooting and Root Cause Analysis.
Cloud-based Security Information and Event Management platform that provides the proactive, preventative maintenance and technology you need to secure your workstations, servers, devices and networks. Multi-Platform Protection for Critical Business-Grade Anti-Virus and Analytics, Enterprise-Grade Anti-Malware Threat Intelligence, Filtering Web Content, Firewall Services, Reviewing firewall rules, Patching the latest vulnerabilities discovered, Inbound and Outbound Email Security.