See How It Works

Vulnerability

TraceCSO’s built-in vulnerability scanner facilitates the management of an organization’s internal and external vulnerabilities. There is no hardware to purchase or maintain.TraceCSO also integrates with other vulnerability scanning vendors, such as Qualys and Tenable.

Vulnerability

A built-in wizard walks the user through the setup and allows the user to search active scans or build a network assets repository through the discovery tool. Three types of scans are available within TraceCSO: vulnerability, configuration or a combination of the two.

Vulnerability

TraceCSO supports true authenticated scanning – automatically detecting control implementation, such as password policy and screen saver settings and intelligently tracks results within the risk assessment.

Vulnerability

Scans can be performed on a single IP or any number of machines and doesn’t need to run on a regular schedule. Instant scans are useful when implementing updates or new assets. They can be used to ensure new vulnerabilities are not introduced to the environment.

Vulnerability

To dive deeper into the functional areas of TraceCSO, click on the links in the "See How it Works" section to the left.