When and with what mission was ScannerX started?
We started developing our systems in 2001 when we could not find an affordable and easily implemented vulnerability scanning solution. IT Managers and System Integrators are under a tremendous amount of pressure. They have multiple and, many times, conflicting demands on their time and financial resources. We found that these people were forced to either invest significant amounts of time and effort to build their own systems or pay substantial licensing fees to other companies. We believed that an affordable easy-to-use subscription based vulnerability scanning service would have broad appeal to people who are held accountable for securing their networks and meeting their budgets.
What are the security services your company specializes in?
ScannerX provides web-based vulnerability assessment products and services to enable security providers, security professionals, and corporate customers to automatically audit Internet-connected networks for security vulnerabilities.
From the technical perspective, how are your security audits setup?
Our security audits are completely initiated and managed through our secure web interface. Through this secure web interface a client can launch on-demand scans against a specific IP or range, or schedule a scan to run at a specific time and date, whether it's every day or week or month, etc. The client has the ability to choose from many different scan types that perform different functions like stealth scanners, denial-of-services attacks, and much more. Once a scan is finished, the customer is automatically notified via email that the scan is completed and ready for them to pickup in our easy to navigate reports directory. Our system has easy-to-read executive reports as well as detailed technical reports for the systems administrators & staff.
What are the pros and cons of automated vulnerability assessment?
Remote vulnerability scanning has many great features that enable users to remotely assess their network just like an intruder would. The benefit of automated vulnerability scanning is that you are empowered with the ability to scan your own system from an outside source from anywhere! Scanning from an external source provides you with the ability to ensure the security of your routers, switches, firewalls and their rules, as well as ensure your intrusion detection system is working properly.
Which operating system do you find to be most secure and why?
There are no really secure out-of-the-box operating systems out there, especially if it is connected to the Internet. New vulnerabilities come out every day, even for systems that may have been secured the day before. Security is not a product, it's a process. Any operating system can be secure if you keep it up-to-date, and check for vulnerabilities on a regular basis and ensure the system's security.
From your experience, what are the top security issues your service usually discovers?
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.