SPEAK WITH AN EXPERT TODAY: +6012 462 7606

Homepage Navigation

Scanning
-
On-demand and scheduled scans – Perform ad-hoc or scheduled security scanning and assessments on IT assets.
-
Flexible benchmarking – Assess compliance using standardized (CIS) or customized security benchmarks based on organizational needs.
Reporting
-
Ingestion on Scan results - Seamlessly ingest and process scan outputs for streamlined reporting and publication.
-
Granular compliance insights – Monitor server compliance status with directly actionable hardening and remediation tasks.
-
Historical compliance tracking – Gain both a high-level overview and detailed insights into past compliance ratings.
​
Automated Hardening
-
A key differentiator!
-
Automates over 250 security controls per benchmark (e.g., RHEL 9 CIS Benchmark).
-
Custom security audits and remediation – Address immediate security vulnerabilities with tailored controls.
Executive Summary
-
Dynamic report generation – Group reports by servers or endpoints with similar characteristics, such as those running the same application.
-
Offline report generation – Export reports in preferred formats and automatically email them to designated recipients.
-
Industry-standard compliance mapping – Align CIS benchmarks with established frameworks such as ISO/IEC 27001, HIPAA, and NIST.​​
​
Host Management
-
Bulk host provisioning – Seamlessly import up to 1000+ endpoints via Excel for automated hardening and remediation.
-
Password deletion – Ensures compliance with strict security policies by removing even encrypted passwords from the database if required.
Patch Assessment
-
OVAL-Standard scanning – Conduct endpoint vulnerability scans using the latest OVAL (Open Vulnerability and Assessment Language) standards, updated daily to ensure accurate detection of emerging threats.
-
Reporting – Receive daily or scheduled vulnerability reports for timely insights. Gain immediate visibility into critical security gaps and required patches, enabling faster remediation.
