OVERVIEW          METHODOLOGY        FAQ's         BUYER's CHECKLIST         ARCHITECTURE

FREE Vulnerability Assessment Click Here       Send me a Quote

FREQUENTLY ASKED QUESTIONS

What is automated network security scanning?
When a hacker (or an automated hacking tool, such as the "Code Red" worm) attempts to break into a network, they do so by identifying a remote machine and exploiting a flaw in the operating system, application or system configuration. The PointScan™  network security scanning service acts as the ultimate hacker, tirelessly and relentlessly checking for every known security flaw on your Internet-accessible machines.

What information is reported?
Provides reports tailored to each role in your enterprise:

Executive summaries that offer a graphical synopsis of security status and trending at a glance.
IT manager's reports that provide a high-level technical overview and facilitate informed decision making to allocate resources to ensure the protection of critical information assets.
Network administrator's reports that contain detailed descriptions of vulnerabilities, step-by-step instructions on repairing them and extensive technical references to the appropriate security bulletins and articles.

All reports are available securely through an SSL-enabled browser in HTML for convenient viewing and may be downloaded in PDF format for distribution.

What kinds of problems does BLISS discover?
The vulnerability database is extensive. Tests are run to discover over 1,700 problems in these categories:

Backdoors, remote control and Trojan horse programs
Brute Force Attacks
CGI-Bin
Denial of Service
DNS and Bind
Finger
Firewall
File Transfer Protocol (FTP)
Information Services (NIS, LDAP, WHOIS)
Mail Services
Microsoft Front Page
Microsoft IIS
News Services
Remote file access
RPC
SMB/NetBIOS Windows sharing
SMTP
SNMP
TCP/IP
UNIX
Web Servers
Windows
X-Windows

I have a firewall. Isn't that enough?
A properly configured and maintained firewall is an essential part of a good network security program, but it is only the first step. A firewall cannot prevent many attacks that exploit flaws or mis-configurations in publicly accessible servers. Most of the 250,000 web servers that were infected with the "Code Red" worm were behind firewalls.

What hardware and software do I need to run?
There's no hardware or software to buy. If you have a browser that supports SSL, you can use to analyze your network security.

Is a training class available?
No special expertise is required to use PointScan™ service. Unlike most vulnerability scanning software utilities, requires no training classes or a network security background to use.

How does it find vulnerabilities?
Software uses a three-phase approach:

  1. Discovery. first identifies all machines in your network that are visible from the Internet, such as web, mail or file servers, firewalls, routers, switches and desktop PC's. It then discovers the services that each machine offers, the type of operating system and the versions of each publicly accessible application.

  2. Exploitation/Analysis. Each service and application discovered in phase one is cross-referenced to an extensive database to generate a list of potential vulnerabilities. For example, if a machine is running Windows and offering web service, a list of Microsoft IIS vulnerability checks is enabled.

    There are a total of over 17,000 vulnerability checks in the database, and the number grows continually as new security holes are discovered. Our security experts monitor vendor security bulletins, security organization announcements and "black hat" hacking sites to keep the vulnerability database as current as possible, and your network as secure as it can be.

  3. Reporting. Detailed and easy-to-read reports are available securely through any SSL-enabled browser, both in HTML format for convenient viewing and PDF format for distribution.
How do I use?
During the signup process, you register the internet addresses of the machines to test, along with other information such as your email address and your company's domain name. You are then supplied with a username and password that allows you to logon securely, using any SSL-enabled browser.

When logged in, you can request an immediate scan of your network or schedule a scan to run at a regular interval of your choice (daily, weekly or monthly). Scan reports contain separate sections for executives, IT managers and technicians, are available in HTML for online viewing and may be downloaded in PDF format.

Will a scan damage or slow down my network?
The software is a "good network citizen", running security tests in a way to minimize the effect on your network. Also, BLISS™ never runs destructive or Denial-of-Service tests that might cause servers to hang, reboot or lose data.

My Sys Admin is diligent. Why do I need to scan my network?
Every competent Sys Admin tests a server before reporting that it is available. BLISS™ are invaluable tools for a Sys Admin because it allows him to test security measures from a hackers point of view - before a hacker does.

Will it break into my network?
It will identify a security holes in your network so they can be patched, but does not exploit it to gain access to your network. Under no circumstances is any data on tested machines examined or retrieved.

I just scanned my network last month. Why scan again?
Your security is only as good as your last scan. Every network change you make is a possibility for a new security hole. Even if no changes are made, new vulnerabilities are discovered by the hacker community on a daily basis. It's an arms race between you and the hackers. BLISS™ makes sure you're always equipped with the latest vulnerability information and best most current security practices. Regular security scans ensure maximum network availability.

FREE Vulnerability Assessment Report Click Here

OVERVIEW          METHODOLOGY        FAQ's         BUYER's CHECKLIST         ARCHITECTURE

PointScan™ is a service of AKABA, Inc.