<<

Datasheet

Reduce your attack surface with proactive vulnerability management

Security configuration Vulnerability assessment management

Leverage attacker-based analytics, Get rid of inappropriate security and prioritize vulnerabilities that are settings and strengthen your system more likely to be exploited by an security. attacker.

360O protection

Patch Management

Decide what to , when to High-risk software audit patch and how to patch. More Audit and eliminate importantly, automate it. unauthorized, unsupported software in your network with just Web server hardening a click of a button.

Safeguard your internet facing servers from many attack variants like XSS, Clickjacking, etc.

Today's challenge Gartner predicts that "99% of the vulnerabilities exploited by the end of 2020 will continue to be ones known by security and IT professionals at the time of the incident." Lack of awareness and a centralized way to facilitate cyber hygiene practices made many organizations vulnerable to cyber attacks. Also, 16,555 vulnerabilities were reported in 2018 according to CVE Details. Organizations are in need to implement a strategic approach for prioritizing and managing vulnerabilities, because not all vulnerabilities pose equal threat to an organization.

The Solution Vulnerability Manager Plus delivers comprehensive vulnerability scanning, assessment and remeditation across all IT assets- servers, desktops, laptops, virtual machines, DMZ servers and roaming devices- from a single point of console.

Use Vulnerability Manager Plus to

Automate vulnerability scanning and continuous monitoring. Manage security configurations of network endpoints. Detect, assess and prioritize vulnerabilities Harden internet facing web servers. Automate patching for Windows, Mac, Linux and 3rd party applications. Eliminate unauthorized software.

Detect vulnerabilities for over Mitigate 1st Scalable upto 30-day 0 day ever VM solution with 50,000 950+ free trial fully functional. applications. vulnerabilities. automated patching. computers. Key capabilities

Vulnerability assessment Patch Management

Keep abreast of emerging vulnerabilities with continuous Automate patching to Windows, Mac, Linux and over 250+ 3rd monitoring and automated scanning. party applications. Assess and prioritize vulnerabilities based on exploitability, Customizable deployment policies for hassle-free deployment. severity, age, aected system count, as well as the availability of Test and approve patches before rolling out to production the fix. machines. Identify and assess zero-day vulnerabilities like Wannacry, Petya, Decline patches to specific groups. meltdown and spectre, etc.

Get insights on vulnerability trend in your network to track your Web server hardening security posture. Continuously monitor your web servers for default and Get a real-time list of top 20 highly critical vulnerabilities in your insecure configurations. network. Analyse web server misconfigurations based on its context Obtain reports on system health status as well as system and gain remediation details as well. vulnerability. Ensure SSL certificates are configured and HTTPS is enabled to secure the communication between the client and server. Security Configuration management Restrict server root directory permissions to prevent Audit antivirus, firewall and bitlocker status to prevent unauthorized access. unauthorized and unintended actions. Ensure password policies, lockout/logon policies and High-risk software audit authentication settings are configured to secure levels. Monitor your network endpoints continuously and detect Manage share permissions, revoke unintended user end-of-life software that doesn't receive security updates from rights, disable legacy protocols to reduce attack surface. the vendor. Make sure OS security settings are configured Get details on the expiry date and the number of days before appropriately. software in your network becomes the end of life. Safely alter security configurations without interrupting Obtain real-time information on peer to peer softwares and business operations with post deployment warnings. remote sharing tools that are deemed unsafe and eliminate these software from the console with just a click of a button.

Agent Hardware Requirements

Processors Processor Speed RAM Size Hard Disk Space

Intel Pentium 1.0 GHz 512 MB 100 MB

Server Hardware Requirements

Number of managed devices Processor RAM Hard disk space

501 to 1000 Intel Core i3 (2 core/4 thread) 2.9 Ghz 3MB cache 4 GB 20 GB

1001 to 3000 Intel Core i5 (4 core/4 thread) 2.3 GHz 6MB cache 8 GB 30 GB

3001 to 5000 Intel Core i7 (6 core/12 thread) 3.2 GHz 12MB cache 8 GB 40 GB

Software Requirements

Supported OS for Server

Windows 7 / 8 / 8.1 / 10 / Servers 2003 / 2003 R2 / 2008 / 2008 R2 / 2012 / 2012 R2 / 2016

Supported OS for Agents

Windows OS* Windows Server OS* Mac OS Linux OS

Windows 10 Windows server 2016 10.12 Ubuntu 10.04 & later versions

Windows 8.1 Windows server 2012 R2 10.11 Debian 7 & later versions

Windows 8 Windows server 2012 10.10 Red Hat 6 & later

Windows 7 Windows server 2008 R2 10.9 CentOS 6 & later

Windows Vista Windows server 2008 10.8

Windows XP Windows server 2003 R2 10.7

Windows server 2003 10.6

Pricing For more details

Professional edition www.vulnerabilitymanagerplus.com Pricing starts at $695/year for 100 computers. [email protected] Enterprise edition Toll free: +1-888-720-9500 Pricing starts at $1195/year for 100 computers.

© 2019 Zoho Corp. All rights reserved.