- Identify devices, OS, ports, services etc.
- Group devices based on tags and functional organization structure
- Schedule scans by devices, groups
- Daily vulnerabillity scan
- Scans in under 5 minutes
- Vulnerability classification
- Risk prioritization
- Identify exploits that could potential use vulnerability
- Identify top devices, assets and OS
- Vulnerability aging data
- Identify critical patches to rollout
- Vulnerability mitigation indices
- Detailed report
- Simple CSV extracts of various vulnerability information
- Alerts for critical vulnerability
- Schedule reports