| |
FREE Vulnerability Assessment
Click
Here Send me a Quote
FREQUENTLY ASKED QUESTIONS
What is automated network security scanning?
When a hacker (or an automated hacking tool, such as the "Code Red"
worm) attempts to break into a network, they do so by identifying a remote
machine and exploiting a flaw in the operating system, application or system
configuration. The PointScan™ network security scanning service acts as the
ultimate hacker, tirelessly and relentlessly checking for every known security
flaw on your Internet-accessible machines.
What information is reported?
Provides reports tailored to each role in your enterprise:
|
Executive summaries that offer a graphical synopsis of
security status and trending at a glance. |
|
IT manager's reports that provide a high-level technical
overview and facilitate informed decision making to allocate resources
to ensure the protection of critical information assets. |
|
Network administrator's reports that contain detailed
descriptions of vulnerabilities, step-by-step instructions on repairing
them and extensive technical references to the appropriate security
bulletins and articles. |
All reports are available securely
through an SSL-enabled browser in HTML for convenient viewing and may be
downloaded in PDF format for distribution.
What kinds of problems does BLISS discover?
The vulnerability database is extensive. Tests are run to discover over
1,700 problems in these categories:
|
Backdoors, remote control and Trojan horse programs |
|
Brute Force Attacks |
|
CGI-Bin |
|
Denial of Service |
|
DNS and Bind |
|
Finger |
|
Firewall |
|
File Transfer Protocol (FTP) |
|
Information Services (NIS, LDAP, WHOIS) |
|
Mail Services |
|
Microsoft Front Page |
|
Microsoft IIS |
|
News Services |
|
Remote file access |
|
RPC |
|
SMB/NetBIOS Windows sharing |
|
SMTP |
|
SNMP |
|
TCP/IP |
|
UNIX |
|
Web Servers |
|
Windows |
|
X-Windows |
I have a firewall. Isn't that enough?
A properly configured and maintained firewall is an essential part of a good
network security program, but it is only the first step. A firewall cannot
prevent many attacks that exploit flaws or mis-configurations in publicly
accessible servers. Most of the 250,000 web servers that were infected with the
"Code Red" worm were behind firewalls.
What hardware and software do I need to
run?
There's no hardware or software to buy. If you have a browser that supports SSL,
you can use to analyze your network security.
Is a training class available?
No special expertise is required to use PointScan™ service. Unlike most
vulnerability scanning software utilities, requires no training classes or
a network security background to use.
How does
it find vulnerabilities?
Software uses a three-phase approach:
- Discovery. first identifies
all machines in your network that are visible from the Internet, such as
web, mail or file servers, firewalls, routers, switches and desktop PC's. It
then discovers the services that each machine offers, the type of operating
system and the versions of each publicly accessible application.
- Exploitation/Analysis. Each service and
application discovered in phase one is cross-referenced to an extensive
database to generate a list of potential vulnerabilities. For example, if a
machine is running Windows and offering web service, a list of Microsoft IIS
vulnerability checks is enabled.
There are a total of over 17,000 vulnerability checks in the database,
and the number grows continually as new security holes are discovered. Our
security experts monitor vendor security bulletins, security organization
announcements and "black hat" hacking sites to keep the
vulnerability database as current as possible, and your network as secure as
it can be.
- Reporting. Detailed and easy-to-read
reports are available securely through any SSL-enabled browser, both in HTML
format for convenient viewing and PDF format for distribution.
How do I use?
During the signup process, you register the internet addresses of the machines
to test, along with other information such as your email address and your
company's domain name. You are then supplied with a username and password that
allows you to logon securely, using any SSL-enabled
browser.
When logged in, you can request an immediate scan of your network or schedule a
scan to run at a regular interval of your choice (daily, weekly or monthly).
Scan reports contain separate sections for executives, IT managers and
technicians, are available in HTML for online viewing and may be downloaded in
PDF format.
Will a scan damage or slow down my
network?
The software is a "good network citizen", running security tests in a way to
minimize the effect on your network. Also, BLISS™ never runs destructive or
Denial-of-Service tests that might cause servers to hang, reboot or lose data.
My Sys Admin is diligent. Why do I need to
scan my network?
Every competent Sys Admin tests a server before reporting that it is available. BLISS™
are
invaluable tools for a Sys Admin because it allows him to test security
measures from a hackers point of view - before a hacker does.
Will it
break into my network?
It will identify a security holes in your network so
they can be patched,
but does not exploit it to gain access to your network. Under no circumstances
is any data on tested machines examined or retrieved.
I just scanned my network last month. Why
scan again?
Your security is only as good as your last scan. Every network change you make
is a possibility for a new security hole. Even if no changes are made, new
vulnerabilities are discovered by the hacker community on a daily basis. It's an
arms race between you and the hackers. BLISS™
makes sure you're always equipped
with the latest vulnerability information and best most current security practices. Regular security
scans ensure maximum network availability.
FREE Vulnerability Assessment Report
Click
Here
OVERVIEW
METHODOLOGY
FAQ's BUYER's
CHECKLIST ARCHITECTURE
PointScan™ is a service of
AKABA, Inc.
|