Frequently Asked Questions

What is automated network security scanning?
When a hacker (or an automated hacking tool, such as the "Code Red" worm) attempts to break into a network, they do so by identifying a remote machine and exploiting a flaw in the operating system, application or system configuration. Akaba's PointScan network security scanning service acts as the ultimate hacker, tirelessly and relentlessly checking for every known security flaw on your Internet-accessible machines.

What information is reported by PointScan?
PointScan provides reports tailored to each role in your enterprise:

Executive summaries that offer a graphical synopsis of security status and trending at a glance.
IT manager's reports that provide a high-level technical overview and facilitate informed decision making to allocate resources to ensure the protection of critical information assets.
Network administrator's reports that contain detailed descriptions of vulnerabilities, step-by-step instructions on repairing them and extensive technical references to the appropriate security bulletins and articles.

All reports are available securely through an SSL-enabled browser in HTML for convenient viewing and may be downloaded in PDF format for distribution.

What kinds of problems does PointScan discover?
The PointScan vulnerability database is extensive. Tests are run to discover over 1,500 problems in these categories:

Backdoors, remote control and Trojan horse programs
Brute Force Attacks
CGI-Bin
Denial of Service
DNS and Bind
Finger
Firewall
File Transfer Protocol (FTP)
Information Services (NIS, LDAP, WHOIS)
Mail Services
Microsoft Front Page
Microsoft IIS
News Services
Remote file access
RPC
SMB/NetBIOS Windows sharing
SMTP
SNMP
TCP/IP
UNIX
Web Servers
Windows
X-Windows

I have a firewall. Isn't that enough?
A properly configured and maintained firewall is an essential part of a good network security program, but it is only the first step. A firewall cannot prevent many attacks that exploit flaws or misconfigurations in publicly accessible servers. Most of the 250,000 web servers that were infected with the "Code Red" worm were behind firewalls.

What hardware and software do I need to run PointScan?
There's no hardware or software to buy. If you have a browser that supports SSL, you can use PointScan to analyze your network security.

Is a training class available?
No special expertise is required to use the PointScan service. Unlike most vulnerability scanning software utilities, PointScan requires no training classes or a network security background to use.

How does PointScan find vulnerabilities?
PointScan uses a three-phase approach:

  1. Discovery. PointScan first identifies all machines in your network that are visible from the Internet, such as web, mail or file servers, firewalls, routers, switches and desktop PC's. It then discovers the services that each machine offers, the type of operating system and the versions of each publicly accessible application.

  2. Exploitation/Analysis. Each service and application discovered in phase one is cross-referenced to an extensive database to generate a list of potential vulnerabilities. For example, if a machine is running Windows and offering web service, a list of Microsoft IIS vulnerability checks is enabled.
    There are a total of over 1,500 vulnerability checks in the PointScan database, and the number grows continually as new security holes are discovered. Our security experts monitor vendor security bulletins, security organization announcements and "black hat" hacking sites to keep the vulnerability database as current as possible, and your network as secure as it can be.

  3. Reporting. Detailed and easy-to-read reports are available securely through any SSL-enabled browser, both in HTML format for convenient viewing and PDF format for distribution.
How do I use PointScan?
During the signup process, you register the internet addresses of the machines to test, along with other information such as your email address and your company's domain name. You are then supplied with a username and password that allows you to logon securely to the PointScan™ service, using any SSL-enabled browser.

When logged in, you can request an immediate scan of your network or schedule a scan to run at a regular interval of your choice (daily, weekly or monthly). Scan reports contain separate sections for executives, IT managers and technicians, are available in HTML for online viewing and may be downloaded in PDF format.

Will a scan damage or slow down my network?
PointScan is a "good network citizen", running security tests in a way to minimize the effect on your network. Also, PointScan never runs destructive or Denial-of-Service tests that might cause servers to hang, reboot or lose data.

My Sys Admin is diligent. Why do I need to scan my network?
Every competent Sys Admin tests a server before reporting that it is available. PointScan is an invaluable tool for a Sys Admin because it allows him to test security measures from a hackers point of view - before a hacker does.

Will PointScan break into my network?
PointScan will identify a security hole in your network so that it can be patched, but does not exploit it to gain access to your network. Under no circumstances is any data on tested machines examined or retrieved.

I just scanned my network last month. Why scan again?
Your security is only as good as your last scan. Every network change you make is a possibility for a new security hole. Even if no changes are made, new vulnerabilities are discovered by the hacker community on a daily basis. It's an arms race between you and the hackers. PointScan makes sure you're always equipped with the latest vulnerability information. Regular security
scans ensure maximum network availability.

Download this page in PDF Format

To learn learn more about how Akaba can service your organization's security needs - please call (408) 884-3765 or e-mail info@akabainc.com
     
Akaba and the Akabainc.com web site are Copyright ©1999-2002 by Akaba, Inc