Our system patches Microsoft Windows desktops,servers, Mac® OS X®, Linux® and more than 50 third-party operating systems and applications. It can deploy both security and non-security patches.
More than 50,000 vulnerability assessments are carried out across your networks, including virtual environments. We scan your operating systems, virtual environments and installed applications through vulnerability check databases such as OVAL and SANS Top 20. This enables you to diagnose the state of your network security, identify security risks to your network, and address how to take action before it is compromised.
Server Monitors maximizes your network availability by monitoring most aspects of your Windows and Linux servers, workstations and devices. Network auditing gives you a comprehensive view of your network: connected USB devices, smartphones and tablets; software that is installed; any open shares, open ports and weak passwords in use; and hardware information.
We integrate with more than 2,500 critical security applications in the following categories: antivirus, anti-spyware, firewall, anti-phishing, backup client, VPN client, URL filtering, patch management, web browser, instant messaging, peer-to-peer, disk encryption, data loss prevention and device access control.
It also provides reports on their status (e.g., if antivirus is enabled and up-to-date, the firewall is turned on; the status of backup software; a list of instant messaging or peer-to-peer applications installed on your network, etc.). It also rectifies any issues that require attention (e.g., trigger antivirus/anti-spyware update; start antivirus/anti-spyware scans; enable antivirus/firewall; uninstall peer-to-peer, etc.).
Asset Tracking And Remote Management
Remote web monitoring offers systems a great deal of freedom, enabling us to quickly and effectively service our clients from anywhere in the world where you can use a browser. That reduces response times to system issues, enabling us to minimize down time in your organization.
Asset tracking gives you a comprehensive view of your network: smartphones and tablets; software that is installed; any open shares, open ports and hardware information. Our in-depth reports give you an important and real-time snapshot of your network’s status.
Automated network security audits scan, with the help of agents, across all client machines. The administrator simply needs to define the network perimeter and provide credentials to enable automatic network discovery, agent deployment and auditing of the client machines.