Continuous Risk Scanning

Starting at $5.75 per month!

Discover Vulnerabilities in Real-Time

Vulnerability management, as part of an organization’s security strategy, is critical to identifying, remediating, and reporting on security vulnerabilities in systems and networks. Continuous Risk Scanning from VectorUSA provides deep, contextual risk analysis to prioritize vulnerabilities and minimize an organization’s “attack surface”.

Reduce Your Cyber Risk Exposure

Identify and categorize server, network, endpoint and application vulnerabilities which could likely be entry points for attackers. Continuous Risk Scanning from VectorUSA helps you successfully track, patch and remediate these critical vulnerabilities.

How Continuous Risk Scanning Works

icon-1

Vulnerability Analysis

The contextual risk scoring engine employs machine learning to correlate over 30 vulnerability metrics to accurately score the most relevant risks that are specific to your organization.

icon-2

Reporting

Once all assets have been identified, our technology ensures you have deep and accurate visibility into the vulnerabilities that pose the biggest risk to your employees. Vulnerability Reports deliver the power of snapshot or historical Vulnerability Assessments as well as risk metrics for business executives. Contextual Risk Scoring Reports focus on the most critical vulnerabilities taking into consideration their potential to be exploited. All reports can be filtered and exported.

icon-3

Continuous Scanning

After the initial vulnerability analysis and reporting, this solution provides continuous risk scanning jobs that will run automatically according to a predefined schedule. If a change is detected in the environment, Customer Vulnerability Reports (CVRs) will be automatically updated so that the vulnerability management information provided is always up-to-date and available.

LogoMark_blue

Key Features

  • Scanning Agent (Windows only)
  • Virtual Scanning appliance for agentless scanning
  • External cloud scanner for scanning of external assets
  • Access to the platform portal to view risk scores, reports and more

    Security Services Checklist

  1. How many internal IP addresses?
  2. How many external IP addresses?
600x620-cybersecurity-tips

Service Requirements

  • Designate a minimum of two (2) staff members to serve as primary and secondary contacts
  • Designate one (1) service desk, help desk or alert contact different from the designated staff members
  • Minimum monthly commitment equal to 30 IPs
    • An IP is defined as an internal or external IP that is scanned by the platform
  • If necessary, resources to run the virtual scanner
cybersecurity

Service Limitations

  • Service does not include remediation of vulnerabilities
  • Service does not meet PCI DSS qualified scanning requirements
  • Resources required to run the virtual scanning appliance are not included
  • Service does not generate alerts or notifications to the partner or VectorUSA about vulnerabilities
600x649-man-on-laptop-lock-concept
  • Key Features
  • Service Requirements
  • Service Limitations

 

Starting at $5.75 per month - Request a quote!

Minimum 30 Ips