Product Advantages
Comprehensive Vulnerability Detection
Detects security vulnerabilities, security configuration issues, and application system vulnerabilities within information systems. Checks for weak passwords, collects unnecessary open accounts, services, and ports, forming an overall security risk report.
Quick Risk Localization
Provides dashboard reports and analytical methods for quickly identifying risk types, areas, and severity after large-scale security checks. Prioritizes based on asset importance and allows direct localization of specific vulnerabilities on specific hosts from the dashboard report.
User-Friendly
Supports asset detection functions, automatically discovering assets. Supports automated scanning tasks with options for immediate, scheduled, or periodic execution.
Closed-Loop Risk Management
Integrates with security management policies, supporting security risk alerts, inspections, graded management, remediation, and auditing processes. Monitors the execution of these processes.
Scenarios
- Host Vulnerability Scanner
- Web Vulnerability Scanner
- Configuration Verification
- Through Vulnerability Scanner services, administrators can regularly conduct network security inspections, discovering and fixing security vulnerabilities as early as possible. This optimizes resource use and improves network operation efficiency.
- Efficient Asset Identification
- Highly automated host discovery, port discovery, system and service identification, and Vulnerability Scanner. Supports identification and scanning of various operating systems, databases, middleware, common software, application systems, virtualization systems, and big data components.
- Extensive System Vulnerability Database
- Can scan over 300,000 vulnerabilities. Uses the internationally recognized CVSS vulnerability scoring system, compatible with CVE, CNCVE, CNVD, and CNNVD databases.