Automated network scanning with identification of IT device class and features Automated vulnerability scanning for new devises in corporate network Flexible settings for network scanners Flexible settings for reports constructor Scalable authorization and authentication settings for networks separation on a corporate level Network abnormality detection On premise or cloud installation High scalability
Automated network scanning with identification of IT device class and features
Automated vulnerability scanning for new devises in corporate network
Flexible settings for network scanners
Flexible settings for reports constructor
Network abnormality detection
On premise or cloud installation
Scalable authorization and authentication settings for networks separation on a corporate level
High scalability
High accuracy
Protected Data Storage
No additional agents or software on users PCs
Inclusion of new customer specific data sources
Constant improvement of device detection algorithms