There are many important considerations to evaluate
Network Security Validation systems. We have compiled
a checklist to help you assess your requirements for
network validation.
Thorough Analysis
ü
Full Scan
to Check for All Known Vulnerabilities
ü
Discovery
Scan to Uncover Exposed IP Addresses & Services
ü
Check for
Default and Common Passwords
ü
Internal
and External Validation
ü
Architecture
and Pricing to Encourage Instant Scans Every Time
ü
Scalable
solution
Simple and Easy to Use
ü
Easy to Start
and Use with No Security Experience Required
ü
Periodic
Scan Scheduling System
ü
Low Usage
of Network Bandwidth
ü
Automatic
Updates of Latest Threats
Comprehensive and Useful
Reports
ü
Graphical
High-Level Reports for Senior Executives
ü
Reports for
Network Managers
ü
Detailed
Reports for IT Professionals
ü
Specific
Corrective Actions
ü
Workflow
Optimized Reporting of Details
ü
Trend Based
Analysis and Reporting
More information is available in the
Network Security Validation:2002 white paper. Fill out
the form on this web site to receive a free copy. Click here