With best-of-breed technology and specially trained Vulnerability Analysts, we survey your infrastructure, verify the results and assist the customer to understand the results. We survey your infrastructure on a fixed schedule so it is easy for you to compare results over time with the trending functionality in the solution. Whether you need Vulnerability Management for compliance or as an external expert opinion, this solution provides excellent documentation of your efforts for managing vulnerabilities
Built on Tenable Nessus and Tenable Security Center, the market leading Vulnerability Management technology is available for you. Operated, maintained and hosted in the Nordics from our Security Operation Center. A pure as-a-Service model based upon a monthly subscription allow you the flexibility you need when your infrastructure changes.
We are proud to present the latest version of our solution, now provided as a complete service suite. Read more in our product sheets.
Perimeter Scanning – Detects and gives you a valuable tool to mitigate vulnerabilities in your systems exposed to the internet
Internal Scanning – Detects and gives you a valuable tool to mitigate vulnerabilities in your internal network. We offer both traditional centralized scanner methodology our agent-based scanners to ft your needs.
Scanning of Cloud Deployments – Specially designed components used to detect and mitigate vulnerabilities in systems in your cloud-based deployments.
Our service levels are designed to fit different levels of maturity and needs for our customers, ranging from Ultimate level, for our most demanding customers to the Standard level, which provides valuable information to guide you in your quest to managing vulnerabilities.
A detailed description of the service level can be found in the System Description.
Periodic Summary - Our senior analyst team creates a high level easy to read summary commenting high-level the results for the latest month.
Scope Overview - Gives you a clear understanding of which targets that are included in the report.
Top 10 Vulnerabilities - The most critical vulnerabilities listed first. Discovery method and remediation suggestions is included.
Visualization of Trends - Usable to track the changes in the vulnerability count over time.
Overview of Scanned Websites - Gives you a clear understanding of which websites that are included in the report.
Overview of Scanned IP-addresses - Gives you a clear understanding of which IP-addresses that are included in the report.