See How It Works

Resources

Vulnerability Scanner for Internal and External IT Security Vulnerabilities - How It Works

TraceCSO’s built-in vulnerability scanner facilitates the management of an organization’s internal and external vulnerabilities. There is no hardware to purchase or maintain.TraceCSO also integrates with other vulnerability scanning vendors, such as Qualys,Tenable and Rapid7.

Vulnerability Scanner for Internal and External IT Security Vulnerabilities - How It Works

A built-in wizard walks the user through the setup and allows the user to search active scans or build a network assets repository through the discovery tool. Three types of scans are available within TraceCSO: vulnerability, configuration or a combination of the two.

Vulnerability Scanner for Internal and External IT Security Vulnerabilities - How It Works

TraceCSO supports true authenticated scanning – automatically detecting control implementation, such as password policy and screen saver settings and intelligently tracks results within the risk assessment.

Vulnerability Scanner for Internal and External IT Security Vulnerabilities - How It Works

Scans can be performed on a single IP or any number of machines and doesn’t need to run on a regular schedule. Instant scans are useful when implementing updates or new assets. They can be used to ensure new vulnerabilities are not introduced to the environment.

Vulnerability Scanner for Internal and External IT Security Vulnerabilities - How It Works

TraceCSO offers patch management capabilities. You can leverage TraceCSO as the deployment engine for your security updates and as a data collection tool that helps to drive system inventory and improve configuration and vulnerability scanning.

Click here to download the TraceCSO Patch Management Data Sheet.

Vulnerability Scanner for Internal and External IT Security Vulnerabilities - How It Works

Many applications can be patched, including browswers (Chrome, Firefox, IE), Adobe products and more. Simplify your information security program and keep your organization secure by managing all of your vulnerability management capabilities within a single interface.

Click here to download the TraceCSO Patch Management Data Sheet.

Vulnerability Scanner for Internal and External IT Security Vulnerabilities - How It Works

To dive deeper into the functional areas of TraceCSO, click on the links in the "See How it Works" section to the left.