Methodology: How PointScan Works

 

 Phase One: Discovery

PointScan™ user initiates a scan while logged in securely using an SSL-enabled browser.

PointScan™ first identifies all machines in your network that are visible from the Internet, such as web, mail or file servers, firewalls, routers, switches and desktop PC's. PointScan™ then discovers the services that each machine offers, the type of operating system and the versions of each publicly accessible application.

 

 Phase Two: Exploration

Each service and application discovered in phase one is cross-referenced to an extensive database to generate a list of potential vulnerabilities. For example, if a machine is running Windows and offering web service, a list of Microsoft IIS vulnerability checks is enabled.

There is a total of over 1,500 vulnerability checks in the PointScan™ database, and the number grows continually as new security holes are discovered. Our security experts monitor vendor security bulletins, security organization announcements and "black hat" hacking sites to keep the vulnerability database as current as possible, and your network as secure as it can be.

 

 Phase Three: Reporting

PointScan™ provides reports tailored to each role in your enterprise:

  • Executive summaries that offer a graphical synopsis of security status and trending at a glance.
  • IT manager's reports that provide a high-level technical overview and facilitate informed decision making to allocate resources to ensure the protection of critical information assets.
  • Network administrator's reports that contain detailed descriptions of vulnerabilities, step-by-step instructions on repairing them and extensive technical references to the appropriate security bulletins and articles.

All reports are available securely through an SSL-enabled browser in HTML for convenient viewing and may be downloaded in PDF format for distribution.

     
Akaba and the Akabainc.com web site are Copyright ©1999-2002 by Akaba, Inc