See How It Works

Vulnerability

TraceCSO’s vulnerability management plays an integral role in the entire system. Not only does the vulnerability scanner facilitate the management of an organization’s internal and external vulnerabilities that could be taken advantage of by an attacker, it also powers many of the functional areas of the system.

Vulnerability

A built-in wizard walks the user through the setup and allows the user to search active scans or build a network assets repository through the discovery tool. Three types of scans are available within TraceCSO: vulnerability, configuration or a combination of the two.

Vulnerability

TraceCSO supports true authenticated scanning – automatically detecting control implementation, such as password policy and screen saver settings and intelligently tracks results within the risk assessment and compliance reviews.

Vulnerability

Configuration scans are designed to gather data for compliance monitoring and reporting. Powered by a global database of regulations and citations, results are automatically parsed and associated back to the organization’s compliance data and controls.

Vulnerability

Scans can be performed on a single IP or any number of machines and doesn’t need to run on a regular schedule. Instant scans are useful when implementing updates or new assets. They can be used to ensure new vulnerabilities are not introduced to the environment and confirm that systems remain in compliance.

Vulnerability

Results from the vulnerability scan are integrated within the functional areas of the system, such as audit, to assist in the automatic attestation to the implementation of controls, compliance to update regulatory compliance status and risk to update scoring based on the completion of scans.

Vulnerability

To dive deeper into the functional areas of TraceCSO, click on the links in the "See How it Works" section to the left.