External Vulnerability Management
The xScan service is designed to run scheduled or on-demand perimeter scans that can be configured for unlimited numbers of scans on any number of external IP addresses. The xScan is managed via the iTrust security management platform and is accessible securely via your web browser. The unlimited scanning feature allows for remediation and immediate retesting, confirming successful resolution without incurring additional cost.
Subscription Based Service
xScan provides real-time security assessments as a subscription service based on the number of IP addresses in scope. Through its' non-intrusive scanning engine and advanced reporting techniques, xScan enables organizations to secure their networks and meet compliance objectives.
Cloud Based Vulnerability Management
The iTrust is a highly secure, centrally managed security management platform that manages the scanning and reporting processes. The xScan service is run from TrustNet's private cloud and hosted at highly secure datacenters around the world.
xScan leverages the iTrust web interface to deliver dynamically generated technical and non-technical reports. Reports are presented in easy to understand graphical formats and can be generated in HTML, PDF, and XML format. The HTML and XML format allows users to import the data into Excel and other reporting tools. xScan reports summarize the security posture of each network device, including information about the scan, host information, and vulnerabilities. Detailed reports include descriptions of the vulnerability, threat severity, potential consequences of exposure, compliance information, detailed step-by-step remediation guidance, and links to external resources for additional patching information. Patching sources include Bugtraq, OSVDB (Open Source Vulnerability Database), CVE (Common Vulnerability and Exposures database), and CVSS (Common Vulnerability Scoring System). Armed with this information, network and security managers can quickly prioritize remediation and take corrective action.
xScan External Vulnerability Management Features
Security Event Management: Includes a single dashboard view of all alerts. Alert detail includes color-coded severity ratings, attack sources, attack targets, time, and date stamp. Users can specify actions such as Dismiss and Escalation to another iTrust user or external email address. Alerts can also be dismissed en masse.
Dashboard Management: Easy to use single view dashboard with data filtering by date, location, and device. Dashboard features a quick view of alert and connection status for all devices. The trending dashboard includes interactive graphic with alerts by volume, target, and attack sources.
Reporting: Easy to understand graphical formats in HTML, PDF, and XML formats. Choose from a selection of standardized reports or create your own using the dynamic report generator. Each issue is color coded and ranked based on severity.
Remediation Guidance: Reports include detailed step-by-step remediation guidance and one-click links to external resources for additional patching information and workarounds. These solutions have been tested and validated by TrustNet’s experienced security team who are on-standby for technical support.
Targeting Scanning: Scan your targets individually or by group. Uses our predefined groups or create an unlimited number of your own for example by location, business unit, subnet, department, and risk level.
xScan External Vulnerability Management Lifecycle