Vulnerability Assessment and Penetration Testing
The automated vulnerability assessment tool (AVAT) is a vulnerability assessment tool for networks of 1 to 2M nodes. It performs an in-depth inspection for security weaknesses that can substantially reduce the cost of, and in some cases replace, penetration testing. With each scan it will automatically find new equipment and services and add them to the inspection schedule.
It then tests every node based on its characteristics and reports its responses to reveal security issues in equipment, operating systems, and applications. You set the IP range to investigate and in a matter of hours and with no network downtime or interruption of services, AVAT will generate detailed reports specifying network security weaknesses.
Our database of tests is updated daily with the most recently discovered security vulnerabilities.
The AVAT database includes over 10,000 known vulnerabilities and the updates include discoveries by our own team and those discovered by corporate and private security teams around the world.
Simple, fast, and comprehensive vulnerability assessmentManual vulnerability assessment tools are problematical for complicated networks because they take too many man-hours to implement. They are therefore not used very frequently. Assessment tools can be time-consuming to set up and operate, are plagued by high false positive rates, and cause network resource issues. Automated testing using AVAT:
- Gets your tactical security work done routinely and quickly
- Provides the fixes you and your staff need for fast mitigation
- Buys you time to focus on security strategy
- Automatically scans new equipment, ports and applications
- Scales to handle multiple networks, business units, countries
- Reduces your patch-work by identifying exactly what is needed
Network security and compliance challengesThe frequency and increasing severity of today’s security threats are forcing companies to:
- Simplify PCI-DSS, SOX and HIPAA compliance
- Strengthen current network security processes and procedures to protect against attacks by both external and internal threats
- Deploy new security solutions that span the entire network
- Restrict customer and partner access and permissions
- Respond to “Security Compliance” mandates, IT upgrades and internal policy changes