Features
Flexible scanning options
Supports both agent-based scanning and scanning via agency-managed Nessus Scanner/Local Scanner (credentialed and non-credentialed).
Web application scanning
Provides basic web application scanning capabilities, such as testing HTTP methods and attempting HTTP Parameter Pollution.
CIS compliance scanning
Offers scanning aligned with CIS benchmarks, allowing agencies to check against their security hardening baselines and improve security posture against misconfigurations or as part of the System Security Acceptance Test prior to commissioning.
Comprehensive dashboards
Features various dashboards for:
- Monitoring vulnerabilities in Production and UAT systems separately.
- Identifying patch and configuration vulnerabilities.
- Providing an overview of systems’ compliance with IM8 policies on vulnerability tracking and aging.
- Summarising OS and application vulnerabilities by application systems.
Hollistic scans
Reports vulnerabilities across Operating Systems (OS), Application Software installed on servers, and Network Devices.
Coverage of Internet and Intranet systems
Capable of scanning both Internet and Intranet systems across the Whole-of-Government Government Enterprise Network and Cloud Hosting Environments.
Thanks for letting us know that this page is useful for you!
If you've got a moment, please tell us what we did right so that we can do more of it.
Did this page help you? - No
Thanks for letting us know that this page still needs work to be done.
If you've got a moment, please tell us how we can make this page better.
Vulnerability Management System
A Security Tool That Manages Vulnerabilities in IT Systems Effectively