|
Frequently Asked Questions
What is automated network security
scanning?
When a hacker (or an automated hacking tool, such as the "Code
Red" worm) attempts to break into a network, they do so by
identifying a remote machine and exploiting a flaw in the
operating system, application or system configuration. Akaba's
PointScan network security scanning service acts as the ultimate
hacker, tirelessly and relentlessly checking for every known
security flaw on your Internet-accessible machines.
What information is reported
by PointScan?
PointScan provides reports tailored to each role in your enterprise:
 |
Executive summaries that offer a graphical
synopsis of security status and trending at a glance.
|
 |
IT manager's reports that provide a high-level
technical overview and facilitate informed decision making
to allocate resources to ensure the protection of critical
information assets. |
 |
Network administrator's reports that contain
detailed descriptions of vulnerabilities, step-by-step
instructions on repairing them and extensive technical
references to the appropriate security bulletins and articles. |
All
reports are available securely through an SSL-enabled browser
in HTML for convenient viewing and may be downloaded in PDF
format for distribution.
What kinds of problems does PointScan
discover?
The PointScan vulnerability database is extensive. Tests are
run to discover over 1,500 problems in these categories:
 |
Backdoors, remote control and Trojan horse
programs |
 |
Brute Force Attacks |
 |
CGI-Bin |
 |
Denial of Service |
 |
DNS and Bind |
 |
Finger |
 |
Firewall |
 |
File Transfer Protocol (FTP) |
 |
Information Services (NIS, LDAP, WHOIS)
|
 |
Mail Services |
 |
Microsoft Front Page |
 |
Microsoft IIS |
 |
News Services |
 |
Remote file access |
 |
RPC |
 |
SMB/NetBIOS Windows sharing |
 |
SMTP |
 |
SNMP |
 |
TCP/IP |
 |
UNIX |
 |
Web Servers |
 |
Windows |
 |
X-Windows |
I have a firewall. Isn't that
enough?
A properly configured and maintained firewall is an essential
part of a good network security program, but it is only the
first step. A firewall cannot prevent many attacks that exploit
flaws or misconfigurations in publicly accessible servers.
Most of the 250,000 web servers that were infected with the
"Code Red" worm were behind firewalls.
What hardware and software
do I need to run PointScan?
There's no hardware or software to buy. If you have a browser
that supports SSL, you can use PointScan to analyze your network
security.
Is a training class available?
No special expertise is required to use the PointScan service.
Unlike most vulnerability scanning software utilities, PointScan
requires no training classes or a network security background
to use.
How does PointScan find
vulnerabilities?
PointScan uses a three-phase approach:
- Discovery.
PointScan first identifies all machines in your network
that are visible from the Internet, such as web, mail or
file servers, firewalls, routers, switches and desktop PC's.
It then discovers the services that each machine offers,
the type of operating system and the versions of each publicly
accessible application.
- Exploitation/Analysis.
Each service and application discovered in phase one is
cross-referenced to an extensive database to generate a
list of potential vulnerabilities. For example, if a machine
is running Windows and offering web service, a list of Microsoft
IIS vulnerability checks is enabled.
There are a total of over 1,500 vulnerability checks in
the PointScan database, and the number grows continually
as new security holes are discovered. Our security experts
monitor vendor security bulletins, security organization
announcements and "black hat" hacking sites to keep the
vulnerability database as current as possible, and your
network as secure as it can be.
- Reporting. Detailed
and easy-to-read reports are available securely through
any SSL-enabled browser, both in HTML format for convenient
viewing and PDF format for distribution.
How do I use PointScan?
During the signup process, you register the internet addresses
of the machines to test, along with other information such as
your email address and your company's domain name. You are then
supplied with a username and password that allows you to logon
securely to the PointScan™ service, using any SSL-enabled
browser.
When logged in, you can request an immediate scan of your network
or schedule a scan to run at a regular interval of your choice
(daily, weekly or monthly). Scan reports contain separate sections
for executives, IT managers and technicians, are available in
HTML for online viewing and may be downloaded in PDF format.
Will a scan damage or slow
down my network?
PointScan is a "good network citizen", running security tests
in a way to minimize the effect on your network. Also, PointScan
never runs destructive or Denial-of-Service tests that might
cause servers to hang, reboot or lose data.
My Sys Admin is diligent. Why do I need to scan my
network?
Every competent Sys Admin tests a server before reporting that
it is available. PointScan is an invaluable tool for a Sys Admin
because it allows him to test security measures from a hackers
point of view - before a hacker does.
Will PointScan break into
my network?
PointScan will identify a security hole in your network so that
it can be patched, but does not exploit it to gain access to
your network. Under no circumstances is any data on tested machines
examined or retrieved.
I just scanned my network
last month. Why scan again?
Your security is only as good as your last scan. Every network
change you make is a possibility for a new security hole. Even
if no changes are made, new vulnerabilities are discovered by
the hacker community on a daily basis. It's an arms race between
you and the hackers. PointScan makes sure you're always equipped
with the latest vulnerability information. Regular security
scans ensure maximum network availability.
Download
this page in PDF Format
To learn learn more about how Akaba can service your organization's
security needs - please call (408) 884-3765 or e-mail info@akabainc.com |