Automatically scan your network assets with All covered Security offerings. Internal and External scanning of vulnerabilities, with customized vulnerability reports.
SQL Database Design For Developers at php[tek] 2024
All Covered's Managed Vulnerability Scan
1. !
✔
All Covered –
Managed Vulnerability Scan
New vulnerabilities emerge on a daily basis that can affect your network,
applications and data whether they are on-premise or in the cloud.
All Covered’s Managed Vulnerability Scan service can provide you with
accurate information on vulnerabilities that exist in your environment.
2. Features
External scanning – provides insight into
vulnerabilities from the outside world. Requires no
hardware or software to be installed.
Internal scanning – provides insight into
vulnerabilities on the network behind your firewall.
Requires installation of a small scan agent.
Asset discovery & security scans of business
assets – up-to-date scans for more than 31,800
vulnerabilities and over 92,000 checks across your
physical and virtual networks, operating systems,
databases, and web applications.
Downloadable reports include Full Detail reports
that include the vulnerabilities detected as well as
recommended remediation actions. Remediation
reports include estimated time to perform the
remediation actions.
Benefits
A complete end–to-end consolidated
security management solution that assesses
vulnerabilities at multiple layers of the IT
infrastructure covering operating systems, various
servers, switches, hubs, wireless access points,
application, etc.
• Provides current view of network security
posture, both internal and external.
• Email notifications of scan completion.
• Ability to run on-demand scans at any time.
• Cloud-based service with no hardware or
software investments required.
• Automates steps in vulnerability management
life-cycle asset discovery
• Risk prioritization and remediation management
• Meets continuous vulnerability scan
requirements for regulatory compliance.
Accurate Vulnerability Information
All Covered’s service will automatically scan your external or internal network on a
monthly basis for new vulnerabilities and provides access to detailed reports and
remediation recommendations. You also gain access to periodic reviews with our highly
skilled Solutions Architects to discuss your security posture.
3. IT SECURITY RISK
CRITICAL
Scanned IT Assets
Vulnerability View
Scanner Status
Your Aegify scanner is up to date and ready to
perform securty scans in your network.
Previous Scan
Internal Scan Result: Successful.
Last scanned Date: 07/11/2014 14:03 EDT.
External Scan Result: Successful.
Last scanned Date: 07/12/2014 02:01 EDT.
Next Scan
Your next Internal Scan/Discovery is
scheduled at: 07/18/2014 14:00 EDT.
An email will be sent when this scan is
completed.
Your next External Scan is scheduled at:
07/19/2014 01:00 EDT.
An email will be sent when this scan is
completed.
Managed Vulnerability Scan Client Portal
9
4
3
162
19
125
36
19
38
236
Report Summary
This report represents a security audit performed by Aegify™ from
eGestalt. It contains confidential information about the state of your
network. Access to this information by unauthorized personnel may allow
them to compromise your network.
Start Time End Time Total Time Status
2014-05-02 14:56:54 2014-05-02 14:56:54 00:01:16 Success
2012-06-14 05:20:41 2012-06-14 06:40:55 01:20:14 Success
2014-05-07 15:43:38 2014-05-07 15:43:38 00:00:00 Success
2014-06-07 05:00:43 2014-06-07 05:03:36 00:02:53 Success
The vulnerability scan results, the level of risk the assets are currently exposed to,
are categorized, based on the CVSS (common Vulnerability Scoring System), into
Critical (CVSS 9 to 10), Very High (CVSS 8 to 8.9), High (CVSS 7 to 7.9, Medium
(CVSS 4 to 6.9), Low (CVSS 1 to 3.9), Very Low/no risks (CVSS 0 to 0.9).
Critical vulnerabilites should be address immediately as they are relatively easy for
attackers to exploit and take full control of the affected systems. High vulnerabilites
make it difficult to access the systems are often harder to exploit, but nevertheless
need to be addressed quickly.These often provide information to attackers that may
assist them in mounting subsequent attacks on your network.The medium, low and
very low vulnerabilities must be examined and addressed.
Computing Devices
The risk of each of the host is calculated based on the highest CVSS Score of the
vulnerabilites present in the host.
Risk categorization of discovered hosts is as follows:
Vulnerability Level No. of Hosts
Critical 2
High 2
Very Low 1
No risk 1
Critical, 2
High, 2
Very Low, 1 No Risk, 1
Executive Summary of Scan Report
Computing Devices Summary