Take a closer look at what makes VulScan so powerful, versatile, and easy-to-use!
|Internal Vulnerability Management||Automate internal vulnerability scans to run at whatever schedule makes sense based on your maturity model. Get alerts with summary info upon scan completion. Access results in web portal to drill in and take action.||MSPs can create and deliver recurring internal vulnerability management services. Internal IT departments can insure that all network locations are being continuously scanned and managed to reduce risk.|
|External Vulnerability Management||Set up a scanner on any machine outside the target network to use it to perform vulnerability scanning on any site(s) you perform internal scanning on. Enjoy all the same functionality as internal vulnerability management, included in the software.||MSPs can create and deliver recurring external vulnerability management services. Internal IT departments can insure that all network locations are being continuously scanned and managed to reduce risk.|
|Scheduled Internal Vulnerability Scanning||A virtual appliance performs automated, scheduled scans of the systems on a network behind the firewall. Scans can be customized to specific IP addresses or address ranges.||Scans are performed on a regular basis to save the technician time. They are also only performed on the desired IP addresses to save scan time, or to avoid scanning specific systems (eg - printer).|
|Scheduled External Vulnerability Scanning||A virtual appliance is installed on a system outside the firewall which can be programmed to scan different public-facing IP addresses, typically a firewall of a computer network or a web or other public facing server.||Identifies issues on public facing systems for remediation to prevent hackers from gaining access through a firewall.|
|Unlimited Scanner Appliances||Multiple scanners can be used to perform internal vulnerability scanning of a network, with the results of the scans combined into a single "site" for overall management of the systems in the network. Multiple scanners may be deployed within a single building/network or can be deployed to different locations/offices. Multiple scanners for a site only consume a single license.||Using multiple scanners on a large network speeds up the scanning process, and allows disparate locations to be scanned and managed as a single site.|
|Auto Email Alerting||Notification of scan results are automatically emailed to the technician. These results can be filtered by IP range or by severity.||The technician only receives desired alerts, and saves the technician time by not having to login to the dashboard to retrieve results.|
|Automatic Service Ticket Creation||VulScan can automatically create tickets for discovered issues/vulnerabilities. The results can be filtered by IP range or by severity.||Saves time and ensures remediation is tracked in PSA system.|
|False Positive Management (Exclusion Rules)||Timely (daily) emails that contain a list of Anomalies, Changes, and Threats prioritized by Severity. Alerts include interactive hyperlinks to start the actions to "remediate" "investigate" or "ignore" the alert.||Reduces "noise" so that only important and desired vulnerabilities are presented in the dashboard, reports and notifications.|
|VulScan PVS - Add On||A Vulscan license to create a portable vulnerability scanner that can be used to perform one-off scans. Use cases include prospecting and project work.||Enables temporary internal vulnerability scanning of a network without having to perform an installation of a virtual appliance on a network, and does not consume a base license of the product. Easily support multiple locations with a single device.|
|Brandable and Customizable Report Generator||Quickly and easily generate reports that provide information on the vulnerabilities discovered that can be filtered using criteria like CVSS score and scan date range. The reports can be customized with your logo and colors.||Reports can be provided to management to show results of the vulnerability issues and effectiveness of vulnerability management.|
|Multi-tenant Dashboard||Singe dashboard view that displays all organizations being managed with drill down to manage the individual site or sites contained within that organization.||Easily and effectively manage multiple organizations and sites.|
|Custom Scan Profiles||Custom Scan Profiles allow you to customize your VulScan tasks. Specifically, you can create scan profiles to target specific TCP and/or UDP ports.||Allows you to perform low impact scans that address only those ports with which you are concerned to speed up scan durations and/or avoid scanning specific IPs/systems.|
|Authenticated Scans / Credentialed Scans||Using credentialed/authenticated scans allows VulScan to access an account on a network endpoint - this can be a computer system or network device via SNMP.||Enables a more thorough internal vulnerability scan which can help detect a wider range of security issues.|
|Common Vulnerabilities and Exposures Support||Adds the ability to search Scan Results for discovered vulnerabilities by Common Vulnerabilities (CVE) ID.||Allows users to research and respond to specific vulnerability issues using the universal labeling convention for any potential and verified vulnerability.|
Every organization’s risk profile is different. That’s why you need a vulnerability scanning tool that’s flexible and scalable. You want complete control over the number of scanners you want to set up, frequency of the scans, range of assets, and depth of scan. With VulScan, you got it!
You want a vulnerability scanner with a huge database of known vulnerabilities to identify every weakness in the IT environments you manage. But you also want the ability to filter out alerts for vulnerabilities that present little to no risk to your specific situation. VulScan delivers!
Most vulnerability scanners are set up to just handle internal vulnerability scanning. Separate services are available to check for external vulnerabilities but the proprietary ones add to your costs, and the free ones take forever and are less reliable. With VulScan, you get both at no extra charge.
As soon as your vulnerability scans are completed, you’ll want to access and manage the results from anywhere on the web-based portal. You want to be able to have scan result alerts selectively emailed to anyone with summary or detailed information. You also need the ability to generate reports for documentation and internal sharing. Get it all with VulScan
Sometimes it makes more economic sense to have an outsourced team take over monitoring your systems so you can focus on bigger picture projects. VulScan has an exclusive workflow integration that can optionally send VulScan alerts directly to the RocketCyber SOC for an affordable extra fee.