Datasheet
Reduce your attack surface with proactive vulnerability management
Security configuration Vulnerability assessment management
Leverage attacker-based analytics, Get rid of inappropriate security and prioritize vulnerabilities that are settings and strengthen your system more likely to be exploited by an security. attacker.
360O protection
Patch Management
Decide what to patch, when to High-risk software audit patch and how to patch. More Audit and eliminate importantly, automate it. unauthorized, unsupported software in your network with just Web server hardening a click of a button.
Safeguard your internet facing servers from many attack variants like XSS, Clickjacking, etc.
Today's challenge Gartner predicts that "99% of the vulnerabilities exploited by the end of 2020 will continue to be ones known by security and IT professionals at the time of the incident." Lack of awareness and a centralized way to facilitate cyber hygiene practices made many organizations vulnerable to cyber attacks. Also, 16,555 vulnerabilities were reported in 2018 according to CVE Details. Organizations are in need to implement a strategic approach for prioritizing and managing vulnerabilities, because not all vulnerabilities pose equal threat to an organization.
The Solution Vulnerability Manager Plus delivers comprehensive vulnerability scanning, assessment and remeditation across all IT assets- servers, desktops, laptops, virtual machines, DMZ servers and roaming devices- from a single point of console.
Use Vulnerability Manager Plus to
Automate vulnerability scanning and continuous monitoring. Manage security configurations of network endpoints. Detect, assess and prioritize vulnerabilities Harden internet facing web servers. Automate patching for Windows, Mac, Linux and 3rd party applications. Eliminate unauthorized software.
Detect vulnerabilities for over Mitigate 1st Scalable upto 30-day 0 day ever VM solution with 50,000 950+ free trial fully functional. applications. vulnerabilities. automated patching. computers. Key capabilities
Vulnerability assessment Patch Management
Keep abreast of emerging vulnerabilities with continuous Automate patching to Windows, Mac, Linux and over 250+ 3rd monitoring and automated scanning. party applications. Assess and prioritize vulnerabilities based on exploitability, Customizable deployment policies for hassle-free deployment. severity, age, aected system count, as well as the availability of Test and approve patches before rolling out to production the fix. machines. Identify and assess zero-day vulnerabilities like Wannacry, Petya, Decline patches to specific groups. meltdown and spectre, etc.
Get insights on vulnerability trend in your network to track your Web server hardening security posture. Continuously monitor your web servers for default and Get a real-time list of top 20 highly critical vulnerabilities in your insecure configurations. network. Analyse web server misconfigurations based on its context Obtain reports on system health status as well as system and gain remediation details as well. vulnerability. Ensure SSL certificates are configured and HTTPS is enabled to secure the communication between the client and server. Security Configuration management Restrict server root directory permissions to prevent Audit antivirus, firewall and bitlocker status to prevent unauthorized access. unauthorized and unintended actions. Ensure password policies, lockout/logon policies and High-risk software audit authentication settings are configured to secure levels. Monitor your network endpoints continuously and detect Manage share permissions, revoke unintended user end-of-life software that doesn't receive security updates from rights, disable legacy protocols to reduce attack surface. the vendor. Make sure OS security settings are configured Get details on the expiry date and the number of days before appropriately. software in your network becomes the end of life. Safely alter security configurations without interrupting Obtain real-time information on peer to peer softwares and business operations with post deployment warnings. remote sharing tools that are deemed unsafe and eliminate these software from the console with just a click of a button.
Agent Hardware Requirements
Processors Processor Speed RAM Size Hard Disk Space
Intel Pentium 1.0 GHz 512 MB 100 MB
Server Hardware Requirements
Number of managed devices Processor RAM Hard disk space
501 to 1000 Intel Core i3 (2 core/4 thread) 2.9 Ghz 3MB cache 4 GB 20 GB
1001 to 3000 Intel Core i5 (4 core/4 thread) 2.3 GHz 6MB cache 8 GB 30 GB
3001 to 5000 Intel Core i7 (6 core/12 thread) 3.2 GHz 12MB cache 8 GB 40 GB
Software Requirements
Supported OS for Server
Windows 7 / 8 / 8.1 / 10 / Servers 2003 / 2003 R2 / 2008 / 2008 R2 / 2012 / 2012 R2 / 2016
Supported OS for Agents
Windows OS* Windows Server OS* Mac OS Linux OS
Windows 10 Windows server 2016 10.12 Ubuntu 10.04 & later versions
Windows 8.1 Windows server 2012 R2 10.11 Debian 7 & later versions
Windows 8 Windows server 2012 10.10 Red Hat 6 & later
Windows 7 Windows server 2008 R2 10.9 CentOS 6 & later
Windows Vista Windows server 2008 10.8
Windows XP Windows server 2003 R2 10.7
Windows server 2003 10.6
Pricing For more details
Professional edition www.vulnerabilitymanagerplus.com Pricing starts at $695/year for 100 computers. [email protected] Enterprise edition Toll free: +1-888-720-9500 Pricing starts at $1195/year for 100 computers.
© 2019 Zoho Corp. All rights reserved.