OVERVIEW       METHODOLOGY       FAQ's        BUYER's CHECKLIST      ARCHITECTURE


FREE Vulnerability Assessment Report Click Here       Send me a Quote

What Does Do?

 

  evaluates your network for security vulnerabilities with the next-generation in network vulnerability scanning.

  provides an organization with security practices and a set of detailed yet easy-to-read security vulnerability reports. These comprehensive reports rank your network's risks, recommend step-by-step fixes, and facilitate informed decisions. ensures the protection of your critical assets. Our services will present separate, customized reports tailored to the key readers in your organization, including executive level, managerial and IT professional.

and is designed to scan the public and private sides of a corporations' network. Web farms "hidden" behind load balancing devices and firewalls can also be evaluated for security vulnerabilities. We market through resellers and service providers to medium and large companies throughout the world.

 

Values
Validates public or private networks to provide a complete security solution
Checks for over 1,700 vulnerabilities, and Trojan horses. Identifies factory default or well known passwords for routers, firewalls and servers.
Annual subscription model ensures consistent security of your network with no additional costs for additional scans
Scheduled BLISS™ VA provides automatic daily, weekly or monthly scanning
Instant BLISS™ VA is used after you make changes in your network
Reports risk level assessment of all vulnerabilities
Extensive reports contain threat descriptions with corrective actions to save hours of time for each threat mitigation process.
Vulnerability Database is always up to date. There is no need to download software updates to maintain vigilance.
BLISS™ VA and is Web based and does not require any additional hardware or software installation to enable an effortless startup process.
Private Label and OEM versions available for service providers.

 

Where is Validation (VA) needed?

Public Networks: It is obvious to most people that they need to check the DMZ or Public Network that is meant for access via the Internet. These are the machines which are most exposed to the world.
Internal Networks: Every enterprise should check vulnerability of the internal network including the servers and desktops. A more limited set of checks can be done for the desktops to reduce costs.
Remote Offices: Companies with multiple locations should always check their branch locations as they would the main headquarters.
Mobile Workers: Similarly mobile workers and telecommuters require validation if they are connected to the Internet via static IP addresses.
Partners: Today's growing business-to-business commerce frequently includes VPN links between companies. Every UNIX, Windows 2000, NT or Windows XP system can be turned into a router that enables a hacker to redirect attacks to any network the computer is connected to. When a partner connects to your network, their vulnerabilities become your vulnerabilities. Many companies are now requiring verification of a network security check. A third party service certification will ensure that their network is protected and in turn your extended network is safe.
Server Farms: Groups of servers providing e-commerce, web or other services on a production network usually hidden behind a layer 4 switch, load balancer or Network Address Translation (NAT) device require assessment from both an internal and external perspective, since an external assessment will not validate all of the servers reliably.

FREE Vulnerability Assessment Click Here

OVERVIEW          METHODOLOGY         FAQ's         BUYER's CHECKLIST      ARCHITECTURE