Gain visibility into your network security
Get visibility, find blank spots, and take control of the security of your networks and systems with our network scanning. The service scans for more than 68,000 vulnerabilities. Irrespective of whether you manage all of your IT yourself or outsource, our network scanning is the most effective way to understand how secure you are against external threats, to rectify vulnerabilities, and increase your cyber security requiring only a small investment in time. The service offers a wide range of compliance functions for GDPR, NIS, PCI DSS, ISO 27001, and more.
Automated & continuous scanning of network & systems
Our Network Scanning automatically and continuously scans your networks and systems for an ever-increasing number of vulnerabilities. Network Scanning detects vulnerabilities related to old software, exposed services, and functions, misconfigured systems, weak passwords, etc. In addition, the service automatically maps your network to give you a clear overview of all your systems – regardless of geographical location and whether you manage all your IT yourself or outsource all or part of your IT environment.
Using comprehensive information, smart and effective tools as well as our support and specialist help, you or your IT partner can effectively prioritize and rectify detected vulnerabilities before they are exploited by a malicious person.
In parallel with a scheduled scanning of your networks and systems, you can scan on demand at any time, for example in connection with changes and commissioning.
Covering the entire IT environment
Our scanners scan your public networks and systems, accessible via the Internet. By installing one or more Scanner Appliances in your local environments, behind your firewalls, we can scan all your networks – even if your IT environment is present in several physical locations. All scanned data collected by our Scanner Appliances is presented in our control panel Security Center.
Vulnerability manager is a powerful tool for you to work effectively with vulnerabilities, regardless of whether you have a small number or thousands. You sort, group, ignore, and prioritize the vulnerabilities in just the way that works best for you in the tool. The tool provides a range of functions for collaboration within your organization and with external partners, such as your IT partner.
In Continuous Monitoring, you can quickly and easily set up monitoring of changes that generate notifications and alarms. This tool removes the need to work in Security Center. Instead, you will be notified when new vulnerabilities are detected, when any changes are made and when vulnerabilities have been rectified. You can easily pinpoint, for example, systems handling personal data for GDPR compliance or a specific network to obtain information about ports that are opened or closed.
The service includes a complete tool for remediation. The flow is largely automated. You set up rules for when to create cases and how to assign them. The tool supports integration with external remediation systems.
A number of ready-made templates are available in the service, and you can create your own reports – adapted for both technicians and specialists, as well as management, CEO, and the board. The reports are distributed in encrypted form to, for example, your IT partner or system vendor. In parallel to creating reports automatically according to your desired schedule, you can create reports on demand at any time.
GDPR & NIS compliance
The service offers a range of GDPR and NIS compliance support functions. You can, among other things, pinpoint your personal data systems to monitor these, and automatically generate continuous reports to the data controller.