Vulnerability Scanner

The Vulnerability Scanner offers comprehensive assessment and rapid detection of various security vulnerabilities across systems. It provides professional, effective security analysis and remediation recommendations, auditing the effectiveness of patches according to security management processes. This reduces attack threats to the greatest extent, achieving closed-loop management of IT asset risks.


  • Product Advantages
  • Features
  • Scenarios

Product Advantages

Comprehensive Vulnerability Detection

Detects security vulnerabilities, security configuration issues, and application system vulnerabilities within information systems. Checks for weak passwords, collects unnecessary open accounts, services, and ports, forming an overall security risk report.

Quick Risk Localization

Provides dashboard reports and analytical methods for quickly identifying risk types, areas, and severity after large-scale security checks. Prioritizes based on asset importance and allows direct localization of specific vulnerabilities on specific hosts from the dashboard report.

User-Friendly

Supports asset detection functions, automatically discovering assets. Supports automated scanning tasks with options for immediate, scheduled, or periodic execution.

Closed-Loop Risk Management

Integrates with security management policies, supporting security risk alerts, inspections, graded management, remediation, and auditing processes. Monitors the execution of these processes.

Features
System Vulnerability Scanner Supports scanning of various mainstream information systems including operating systems, databases, middleware, network devices, security devices, and commonly used software. Vulnerability knowledge base is compatible with international and Chinese vulnerability database standards, and the risk assessment model aligns with the internationally recognized CVSS vulnerability scoring standard.
Web Application Vulnerability Scanner Uses an independent web application Vulnerability Scanner engine to comprehensively detect various web application systems. Supports over a thousand web application vulnerability detection methods, including website malware detection and web vulnerability detection. Utilizes innovative technologies for fast and stable scanning of massive pages.
Configuration Verification Automatically discovers and analyzes security configuration issues in various devices and systems. Avoids errors associated with traditional manual checks, enhancing the accuracy and compliance of inspection results. Includes over a hundred templates covering various types of systems.

Scenarios

< >
  • Host Vulnerability Scanner
  • Web Vulnerability Scanner
  • Configuration Verification
Scenario Description
  • Through Vulnerability Scanner services, administrators can regularly conduct network security inspections, discovering and fixing security vulnerabilities as early as possible. This optimizes resource use and improves network operation efficiency.
Product Advantages
  • Efficient Asset Identification
  • Highly automated host discovery, port discovery, system and service identification, and Vulnerability Scanner. Supports identification and scanning of various operating systems, databases, middleware, common software, application systems, virtualization systems, and big data components.
  • Extensive System Vulnerability Database
  • Can scan over 300,000 vulnerabilities. Uses the internationally recognized CVSS vulnerability scoring system, compatible with CVE, CNCVE, CNVD, and CNNVD databases.