SlideShare a Scribd company logo
1 of 4
Download to read offline
LEADING	EUROPEAN	VULNERABILITY	ANALYSIS	AND	SECURITY	MONITORING	TOOL	
Having a clear view of your overall security issues has always been a time consuming,
costly to implement and difficult to manage process, especially when taking into account
asset variety and the associated threats.
IKare automates security best practices, as well as your entire vulnerability
management process. The tool provides a simple solution to network discovery,
common sense security practices control and vulnerability assessment, all
included in one single package. It can upgrade security up to 90%, which is
already 10 times more than what a firewall or an antivirus can achieve.
IKare combines successful engines that boost team work. It allows you to cross-
correlate data and to filter or to simplify results for both managers and engineers. All
services are integrated into a single view and provide the same type of information,
displayed differently according to a user’s specific needs.
IT	Security	delivered	as	a	Service	
IKare’s approach to IT Security enables organizations to successfully achieve both
control over security best practices and vulnerability management, while automating the
whole process and reducing costs. Taking advantage of the Software as a Service
(SaaS) possibilities, IKare combines powerful services with a tailored delivery model.
VULNERABILITY MANAGEMENT
IKare automates the vulnerability management process lifecycle across the
organization. Regardless of the size of your organization, IKare enables you to keep an
eye on and efficiently manage your network security.
	
IT	SECURITY	MONITORING	
IKare is a fully automated tool dedicated to security and vulnerability management,
which can toggle: from a “photo” mode (IT flash security audit done every year at a
specific date), to a “video” mode (monitoring your IT security level as well as each of its
components), and generate automatic summary reports, including synthetic reports,
targeting corporate reps.
IKare is continuously evolving thanks to the experience of our security engineers. They
permanently feed the security and vulnerability test scenario database. These new tests
are then automatically pushed forward to our Customers using IKare (as done in the
case of antivirus signature databases). Therefore, an optimal security level is maintained
with the help of knowledge concerning past breaches or security alerts, as well as any
recent intrusion scenarios known or encountered by our teams.
BEST	PRACTICES		
“The antivirus is no match in the face of
new threats. To maintain a good
security level by avoiding default
passwords and by monitoring security
flaws was, and still is, the best practice
for SMEs”.
Herve Schauer, Security Expert
AUTOMATE	YOUR	
vulnerability	management	
process	
“To a cybercriminal, your network
vulnerabilities are high-value assets (or,
in other words, “open doors”). When
exposed, these vulnerabilities can be
targeted for exploitation, which may
result in unauthorized entry into a
network. This can also lead to the
exposure of confidential information,
providing fuel for stolen identities,
triggering theft of trade secrets,
violating privacy law provisions, or even
paralyzing business operations. Every
day, new vulnerabilities appear
because of misconfigurations, flaws in
software codes and human errors. The
wider and more complex your network
is, the more you are exposed to
vulnerabilities. The issue of vulne-
rabilities concerns all organizations and
so, we understand that vulnerability
management is essential if we want to
avoid risks.”
Source: “Vulnerability Management for
Dummies”
AWARDS	
ITrust has already won several
international innovation awards:
Developed with the support of the region:
Created by
Technology	insight	
The Open Vulnerability Assessment System (OpenVAS) is a
framework of services and tools offering a comprehensive and
powerful vulnerability scanning and vulnerability management
solution. The actual security scanner is accompanied by a daily
updated feed of Network Vulnerability Tests.
As Security Consultants, we decided to take advantage of our
field experience, integrating the best security practices into one
single easy-to-use tool. Indeed, IKare includes a Security
monitoring scanner working along with a Vulnerability
Assessment scanner. This unique technology increases
drastically the accuracy of security flaws detection and reduces
the chances of false positives.
A	powerful	scanner	and	monitoring	tool	
IKare is a light scanner that does not impact systems and that
can run fast and give users a “real-time” view. Our pentesting
engineers developed this technology in our lab to be able to
easily target exploitation flaws.
Originally conceived to perform more efficiently internal intrusive
audits, our powerful scanner automates a large number of
scripts: Netbios, LDAP, SNMP, FTP, NFS, MSSQL, MySQL,
Oracle…
Now, the scanner is also working great for external servers with
HTTP, SSL, WEBApps, DNSn SMTP, SSH… and is able to
perform both internal and external scans as a fully-established
vulnerability scanner.
The IKare process is different from other vulnerability scanning
solutions, since it introduces the notion of “memory” between two
scans and provides thereby a real time security monitoring.
IKare	displays	the	following	features:	
ASSET	DISCOVERY	
Assets are auto-discovered and added to the IKare Mapping.
Securing an infrastructure begins by knowing every device and
application within your network. IKare, through the IKare
scanner, can discover most devices and applications including
firewalls, servers, operating systems, desktop, printers, wireless
devices, as well as many other elements.
SECURITY	MONITORING	
Easily check compliance with security ‘best practices’.
Our technology is able to neutralize even the latest threats,
thanks a great vulnerability knowledge base, updated each week
by a strong community.
VULNERABILITY	MANAGEMENT	
Simplify and automate Vulnerability Management using a trusted
vulnerability scanner (OpenVas), IKare is capable of accurately
detecting the vulnerabilities across your network. Also, our Web
Application Scanner (Available since the 1.8 release) automates
web application security assessment.
90% of problems and risk in companies are issued from only ten
vulnerabilities. IKare protects you from these 10 weaknesses and
easily brings security up to 90%.
Top	10	flaws		
in	enterprises		
Covered	
by	IKare	
Verbose	systems	
C
Weak	passwords	
C
Rights	&	special	access	
C
Trust	between	domains	
C
Default	database	password	
C
Verbose	DNS	servers		
for	internal	domains	
C
Sharing	confidential	files	
C
Unecrypted	protocols		
or	misconfigurations	
C
Development	servers,	
abandoned	servers	
C
Uncorrected	vulnerabilities	
C
FEATURES	
ITRUST	SECURITY	METRICS	
The ITrust label will prove to your customers what a high
security level you have in place. It is an authentic evidence of
your efforts to maintain a high-level of security.
ANALYZE	THREATS	
IKare’s reports provide both executive summaries and a
detailed analysis including all vulnerabilities, a description, a
risk factor, a CVSS score and the already practiced solutions.
The ITrust technology is the most efficient one when
threats are to be avoided – given its huge databases, it
recognizes 100% of all known vulnerabilities.
Coverage rate of top 10 vulnerabilities
by technology type
Non-intrusive	
By using scanning technologies, IKare does not impact or
disturb customers’ resources. IKare has no impact on
information services. Indeed, its powerful algorithm is
optimized to not use large bandwidth. Agentless scanning
technology – does not impact resources. There’s no need to
install agent, an IP device is detected and audited each time
when its behavior changes.
Software	as	a	Service	
There is nothing to install for external scans. And it only
requires a few minutes to install IKare virtual server within
an internal environment. SaaS also represents economic
advantages with no extra expenditures:
n Lowers your operational costs of deployment and
operation;
n Variabilisation (opexisation) of fixed costs concerning
computer security;
n Lower insurance premiums and production operations.
Global	deployment	
n Assesses security within geographically distributed
networks;
n Detects inappropriate changes in networks, efficiently and
in an up-to-date manner;
n Our engineers are always active and willing to improve all
technologies used by IKare;
n Moreover, the different knowledge bases and product
improvements are open and global;
n Offer a real-time vision of network assets state through
short period scanning;
n One to six hours to put you in regulatory compliance:
n Package Telecom European-Union compliance;
n No production disruption during the security scan.
ADVANTAGES	
	
Identify	easy-to-exploit	security	flaws	
IKare performs basic and best practices security tests to
identify easily-exploitable security flaws (example: sharing
with low restrictions).
n These engines reduce the number of false positives and
detect abnormal behaviors such as unknown viruses "0
day";
n Consistency with CNIL E-Privacy;
n Vulnerability detection becomes much more reliable;
n Vulnerability audit in real time.
Detect	malicious	behavior	
n Le scan détecte les changements inappropriés sur le
réseau en comparant les données avec celui fait
précédemment (exemple : un nouvel utilisateur devient
administrateur) ;
n Identification des zones de responsabilité ;
n Alertes de sécurité ;
n Evolution du niveau de sécurité.
Analyze	security	flaws	
n Scan detects inappropriate changes within your network
by comparing data with previous vulnerabilities (example:
a new user becomes admin);
n Business Unit Management;
n Security Alerts;
n Treding, time trends of safety.
Centralized	vulnerability	management	
n Automatic centralized reporting from distributed scans;
n Consolidated administration of both internal and external
(perimeter) scanning;
n Executive Dashboard;
n Asset-based solution with an interactive asset search
portal;
n Authorized user access from any location;
n Export reports.
Automation	
n Scheduled scans and network discoveries;
n Automated daily updates concerning the vulnerability
knowledge base;
n Automated remediation ticket generation and verification;
n ITrust delivers an easy-to-use scanning infrastructure for
distributed networks that can be deployed in 10 minutes;
n High-level ITrust security data center.
Tested	protocols	
n Databases (MYSQL, oracle, MSSQL)
n SSL/TLS and certificate X509
n RPC (DCE and UNIX)
n DNS (on UDP et TCP)
n Finger, FTP, LDAP
n http (reverse proxy method and WeBapps )
n Netbios (datashare, users on SMB et RPC)
n NTP, Pop 3, telnet
n Small services (chargen, echo…) SMTP, SNMP, SSH
Accuracy	
n Comprehensive vulnerability knowledge base
incorporating thousands of unique checks;
n Trusted, third-party network security certification with
tamper resistant audit trails;
n Inference-based scanning engine with non-intrusive
scanning techniques;
n Both entrusted and authenticated scanning capabilities.
n Internal and external scanning provides a 360-degree
view of network vulnerabilities;
n Configurable scans for customized audits;
n Unique fingerprints for over 2,000 operating systems,
applications and protocols.
Reporting	
n Customizable reports for on demand reporting by a
business unit for executives and managers;
n Automated trending and differential report;
n Remediation reporting: ticket trending by asset group,
user and vulnerability;
n Scorecard reports for enterprise stakeholders;
n Automated report generation and distribution;
n Multiple report distribution options.
Evolution	
n On demand SaaS technology allows users to scan
globally with no additional infrastructure;
n Fast scanning through load balancing of scanner
appliances;
n User definable Business Units and Asset Groups that tie
into business operations;
n End-to-end encryption of vulnerability data;
n Hierarchical role-based user access controls allowing
delegation of responsibilities to reflect organizational
structure;
n Policy-based remediation workflow management with
automatic trouble ticket creation and assignment.
Interoperability		
n Extensible API XML;
n Integration with others SIM, HelpDesk solutions;
n Industry standard support for vulnerability scoring with
Common Vulnerability Scoring System (CVSS);
n Industry standard support for the addition of custom
detections using Open Vulnerability Assessment
Language (OVAL).	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
ADVANTAGES		
	
	
Support/Maintenance	
n 24x7x365 live customer support;
n Daily signature updates and features enhancement are
completed automatically: transparent to the user;
n On-going Web-based customer training;
n Technical training and certification workshop.
Pricing	
Annual subscription offers an unlimited assessment of a
redefined number of IP devices. Ideal for regular security
assessment of network assets.
Delivery	
IKare is delivered as a SaaS (Software as a service), both
internally and externally; also available in cloud mode from
ITrust servers. Starting from an ISO image, IKare is instantly
deployed on an existing infrastructure and comes running in
minutes. IKare can next be accessed via a simple browser
on any platform.
n Agentless – no agent to install,
n Automatic network and applications discovery,
n Minimalist footprint on bandwidth,
n Ready-to-connect to your IT via XML-RPC API,
n Delivered as well as virtual or physical device,
The	ITrust	security	label	
It independently establishes the security of your information
system, according to objective criteria and international
standards. The display of this label reassures your clients
about the reduction of their overall risk. They would prefer to
contract with assessed and labeled suppliers, rather than
associate themselves with those who are not.
CONTACT	
Headquarters International Office
Address: ITrust, 55 avenue l’Occitane Address: ITrust, 5 rue de Castiglione
31670 Labège Cedex, France 75001 Paris, France
Telephone: +33 5 67 34 67 80 Telephone: +33 5 67 34 67 80
Email: sales@itrust.fr
Websites
www.itrust.fr/en
www.ikare-monitoring.com

More Related Content

What's hot

A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...Kaspersky
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint SecurityBurak DAYIOGLU
 
Qualys Brochure for CISOs
Qualys Brochure for CISOsQualys Brochure for CISOs
Qualys Brochure for CISOsQualys
 
Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Skybox Security
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentationData Unit
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky
 
From IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity DivideFrom IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity DividePriyanka Aash
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Russia
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssAndrew Wong
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorKaspersky
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationQualys
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíMarketingArrowECS_CZ
 

What's hot (20)

A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Qualys Brochure for CISOs
Qualys Brochure for CISOsQualys Brochure for CISOs
Qualys Brochure for CISOs
 
IBM QRadar Xforce
IBM QRadar XforceIBM QRadar Xforce
IBM QRadar Xforce
 
Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
From IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity DivideFrom IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity Divide
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
 
Check Point mission statement
Check Point mission statementCheck Point mission statement
Check Point mission statement
 
Cisco NGFW AMP
Cisco NGFW AMPCisco NGFW AMP
Cisco NGFW AMP
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitiveCheck point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediation
 
Kaspersky
KasperskyKaspersky
Kaspersky
 
ESET on cybersecurity.
ESET on cybersecurity.ESET on cybersecurity.
ESET on cybersecurity.
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
 

Similar to IKare Vulnerability Scanner - Datasheet EN

RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your NetworkRSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your NetworkSkybox Security
 
Brochure Swascan Overview
Brochure Swascan OverviewBrochure Swascan Overview
Brochure Swascan OverviewSara Colnago
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentationaksit_services
 
Importance of Vulnerability Scanning for Businesses | SOCVault.io
Importance of Vulnerability Scanning for Businesses | SOCVault.ioImportance of Vulnerability Scanning for Businesses | SOCVault.io
Importance of Vulnerability Scanning for Businesses | SOCVault.ioSOCVault
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptxMetaorange
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdfMetaorange
 
Allianz Global CISO october-2015-draft
Allianz Global CISO  october-2015-draftAllianz Global CISO  october-2015-draft
Allianz Global CISO october-2015-draftEoin Keary
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperMohd Anwar Jamal Faiz
 
Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51martinvoelk
 
Demand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxDemand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxAardwolf Security
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabiltiesSneha .
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Ricardo Resnik
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochureGeorge Wainblat
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfImamBahrudin5
 

Similar to IKare Vulnerability Scanner - Datasheet EN (20)

RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your NetworkRSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
 
Brochure Swascan Overview
Brochure Swascan OverviewBrochure Swascan Overview
Brochure Swascan Overview
 
Swascan
Swascan Swascan
Swascan
 
SanerNow platform-datasheet
SanerNow platform-datasheetSanerNow platform-datasheet
SanerNow platform-datasheet
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentation
 
Aksit profile final
Aksit profile finalAksit profile final
Aksit profile final
 
Importance of Vulnerability Scanning for Businesses | SOCVault.io
Importance of Vulnerability Scanning for Businesses | SOCVault.ioImportance of Vulnerability Scanning for Businesses | SOCVault.io
Importance of Vulnerability Scanning for Businesses | SOCVault.io
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
ITrust Security Operating Center (SOC) - Datasheet EN
ITrust Security Operating Center (SOC) - Datasheet ENITrust Security Operating Center (SOC) - Datasheet EN
ITrust Security Operating Center (SOC) - Datasheet EN
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
Allianz Global CISO october-2015-draft
Allianz Global CISO  october-2015-draftAllianz Global CISO  october-2015-draft
Allianz Global CISO october-2015-draft
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
Axxera ci siem
Axxera ci siemAxxera ci siem
Axxera ci siem
 
Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51
 
Demand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxDemand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docx
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochure
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 

More from ITrust - Cybersecurity as a Service

L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécuritéL’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécuritéITrust - Cybersecurity as a Service
 
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécuritéQuand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécuritéITrust - Cybersecurity as a Service
 
Artificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersArtificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersITrust - Cybersecurity as a Service
 
Passer de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesPasser de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesITrust - Cybersecurity as a Service
 
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...ITrust - Cybersecurity as a Service
 

More from ITrust - Cybersecurity as a Service (20)

IT security : a five-legged sheep
IT security : a five-legged sheepIT security : a five-legged sheep
IT security : a five-legged sheep
 
Petya, pire que WannaCry ?
Petya, pire que WannaCry ?Petya, pire que WannaCry ?
Petya, pire que WannaCry ?
 
L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécuritéL’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
 
Manifeste ResistanceCYBER 29.05.17
Manifeste ResistanceCYBER 29.05.17Manifeste ResistanceCYBER 29.05.17
Manifeste ResistanceCYBER 29.05.17
 
Advanced persistent threats, entre mythe et réalité
Advanced persistent threats, entre mythe et réalitéAdvanced persistent threats, entre mythe et réalité
Advanced persistent threats, entre mythe et réalité
 
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécuritéQuand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
 
Artificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersArtificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changers
 
Manifeste ResistanceCYBER 19.05.17
Manifeste ResistanceCYBER 19.05.17Manifeste ResistanceCYBER 19.05.17
Manifeste ResistanceCYBER 19.05.17
 
Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17
 
Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17
 
Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17
 
Passer de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesPasser de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menaces
 
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
 
L’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en AngleterreL’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en Angleterre
 
Ignorance is bliss, but not for MongoDB
Ignorance is bliss, but not for MongoDBIgnorance is bliss, but not for MongoDB
Ignorance is bliss, but not for MongoDB
 
Cisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magicCisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magic
 
ITrust Company Overview FR
ITrust Company Overview FRITrust Company Overview FR
ITrust Company Overview FR
 
ITrust Company Overview EN
ITrust Company Overview ENITrust Company Overview EN
ITrust Company Overview EN
 
SOC OEM - Datasheet FR
SOC OEM - Datasheet FRSOC OEM - Datasheet FR
SOC OEM - Datasheet FR
 
SOC OEM - Datasheet EN
SOC OEM - Datasheet ENSOC OEM - Datasheet EN
SOC OEM - Datasheet EN
 

Recently uploaded

%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durbanmasabamasaba
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024Mind IT Systems
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfayushiqss
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...masabamasaba
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfVishalKumarJha10
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 

Recently uploaded (20)

%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 

IKare Vulnerability Scanner - Datasheet EN

  • 1. LEADING EUROPEAN VULNERABILITY ANALYSIS AND SECURITY MONITORING TOOL Having a clear view of your overall security issues has always been a time consuming, costly to implement and difficult to manage process, especially when taking into account asset variety and the associated threats. IKare automates security best practices, as well as your entire vulnerability management process. The tool provides a simple solution to network discovery, common sense security practices control and vulnerability assessment, all included in one single package. It can upgrade security up to 90%, which is already 10 times more than what a firewall or an antivirus can achieve. IKare combines successful engines that boost team work. It allows you to cross- correlate data and to filter or to simplify results for both managers and engineers. All services are integrated into a single view and provide the same type of information, displayed differently according to a user’s specific needs. IT Security delivered as a Service IKare’s approach to IT Security enables organizations to successfully achieve both control over security best practices and vulnerability management, while automating the whole process and reducing costs. Taking advantage of the Software as a Service (SaaS) possibilities, IKare combines powerful services with a tailored delivery model. VULNERABILITY MANAGEMENT IKare automates the vulnerability management process lifecycle across the organization. Regardless of the size of your organization, IKare enables you to keep an eye on and efficiently manage your network security. IT SECURITY MONITORING IKare is a fully automated tool dedicated to security and vulnerability management, which can toggle: from a “photo” mode (IT flash security audit done every year at a specific date), to a “video” mode (monitoring your IT security level as well as each of its components), and generate automatic summary reports, including synthetic reports, targeting corporate reps. IKare is continuously evolving thanks to the experience of our security engineers. They permanently feed the security and vulnerability test scenario database. These new tests are then automatically pushed forward to our Customers using IKare (as done in the case of antivirus signature databases). Therefore, an optimal security level is maintained with the help of knowledge concerning past breaches or security alerts, as well as any recent intrusion scenarios known or encountered by our teams. BEST PRACTICES “The antivirus is no match in the face of new threats. To maintain a good security level by avoiding default passwords and by monitoring security flaws was, and still is, the best practice for SMEs”. Herve Schauer, Security Expert AUTOMATE YOUR vulnerability management process “To a cybercriminal, your network vulnerabilities are high-value assets (or, in other words, “open doors”). When exposed, these vulnerabilities can be targeted for exploitation, which may result in unauthorized entry into a network. This can also lead to the exposure of confidential information, providing fuel for stolen identities, triggering theft of trade secrets, violating privacy law provisions, or even paralyzing business operations. Every day, new vulnerabilities appear because of misconfigurations, flaws in software codes and human errors. The wider and more complex your network is, the more you are exposed to vulnerabilities. The issue of vulne- rabilities concerns all organizations and so, we understand that vulnerability management is essential if we want to avoid risks.” Source: “Vulnerability Management for Dummies” AWARDS ITrust has already won several international innovation awards: Developed with the support of the region: Created by
  • 2. Technology insight The Open Vulnerability Assessment System (OpenVAS) is a framework of services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution. The actual security scanner is accompanied by a daily updated feed of Network Vulnerability Tests. As Security Consultants, we decided to take advantage of our field experience, integrating the best security practices into one single easy-to-use tool. Indeed, IKare includes a Security monitoring scanner working along with a Vulnerability Assessment scanner. This unique technology increases drastically the accuracy of security flaws detection and reduces the chances of false positives. A powerful scanner and monitoring tool IKare is a light scanner that does not impact systems and that can run fast and give users a “real-time” view. Our pentesting engineers developed this technology in our lab to be able to easily target exploitation flaws. Originally conceived to perform more efficiently internal intrusive audits, our powerful scanner automates a large number of scripts: Netbios, LDAP, SNMP, FTP, NFS, MSSQL, MySQL, Oracle… Now, the scanner is also working great for external servers with HTTP, SSL, WEBApps, DNSn SMTP, SSH… and is able to perform both internal and external scans as a fully-established vulnerability scanner. The IKare process is different from other vulnerability scanning solutions, since it introduces the notion of “memory” between two scans and provides thereby a real time security monitoring. IKare displays the following features: ASSET DISCOVERY Assets are auto-discovered and added to the IKare Mapping. Securing an infrastructure begins by knowing every device and application within your network. IKare, through the IKare scanner, can discover most devices and applications including firewalls, servers, operating systems, desktop, printers, wireless devices, as well as many other elements. SECURITY MONITORING Easily check compliance with security ‘best practices’. Our technology is able to neutralize even the latest threats, thanks a great vulnerability knowledge base, updated each week by a strong community. VULNERABILITY MANAGEMENT Simplify and automate Vulnerability Management using a trusted vulnerability scanner (OpenVas), IKare is capable of accurately detecting the vulnerabilities across your network. Also, our Web Application Scanner (Available since the 1.8 release) automates web application security assessment. 90% of problems and risk in companies are issued from only ten vulnerabilities. IKare protects you from these 10 weaknesses and easily brings security up to 90%. Top 10 flaws in enterprises Covered by IKare Verbose systems C Weak passwords C Rights & special access C Trust between domains C Default database password C Verbose DNS servers for internal domains C Sharing confidential files C Unecrypted protocols or misconfigurations C Development servers, abandoned servers C Uncorrected vulnerabilities C FEATURES ITRUST SECURITY METRICS The ITrust label will prove to your customers what a high security level you have in place. It is an authentic evidence of your efforts to maintain a high-level of security. ANALYZE THREATS IKare’s reports provide both executive summaries and a detailed analysis including all vulnerabilities, a description, a risk factor, a CVSS score and the already practiced solutions. The ITrust technology is the most efficient one when threats are to be avoided – given its huge databases, it recognizes 100% of all known vulnerabilities. Coverage rate of top 10 vulnerabilities by technology type
  • 3. Non-intrusive By using scanning technologies, IKare does not impact or disturb customers’ resources. IKare has no impact on information services. Indeed, its powerful algorithm is optimized to not use large bandwidth. Agentless scanning technology – does not impact resources. There’s no need to install agent, an IP device is detected and audited each time when its behavior changes. Software as a Service There is nothing to install for external scans. And it only requires a few minutes to install IKare virtual server within an internal environment. SaaS also represents economic advantages with no extra expenditures: n Lowers your operational costs of deployment and operation; n Variabilisation (opexisation) of fixed costs concerning computer security; n Lower insurance premiums and production operations. Global deployment n Assesses security within geographically distributed networks; n Detects inappropriate changes in networks, efficiently and in an up-to-date manner; n Our engineers are always active and willing to improve all technologies used by IKare; n Moreover, the different knowledge bases and product improvements are open and global; n Offer a real-time vision of network assets state through short period scanning; n One to six hours to put you in regulatory compliance: n Package Telecom European-Union compliance; n No production disruption during the security scan. ADVANTAGES Identify easy-to-exploit security flaws IKare performs basic and best practices security tests to identify easily-exploitable security flaws (example: sharing with low restrictions). n These engines reduce the number of false positives and detect abnormal behaviors such as unknown viruses "0 day"; n Consistency with CNIL E-Privacy; n Vulnerability detection becomes much more reliable; n Vulnerability audit in real time. Detect malicious behavior n Le scan détecte les changements inappropriés sur le réseau en comparant les données avec celui fait précédemment (exemple : un nouvel utilisateur devient administrateur) ; n Identification des zones de responsabilité ; n Alertes de sécurité ; n Evolution du niveau de sécurité. Analyze security flaws n Scan detects inappropriate changes within your network by comparing data with previous vulnerabilities (example: a new user becomes admin); n Business Unit Management; n Security Alerts; n Treding, time trends of safety. Centralized vulnerability management n Automatic centralized reporting from distributed scans; n Consolidated administration of both internal and external (perimeter) scanning; n Executive Dashboard; n Asset-based solution with an interactive asset search portal; n Authorized user access from any location; n Export reports. Automation n Scheduled scans and network discoveries; n Automated daily updates concerning the vulnerability knowledge base; n Automated remediation ticket generation and verification; n ITrust delivers an easy-to-use scanning infrastructure for distributed networks that can be deployed in 10 minutes; n High-level ITrust security data center. Tested protocols n Databases (MYSQL, oracle, MSSQL) n SSL/TLS and certificate X509 n RPC (DCE and UNIX) n DNS (on UDP et TCP) n Finger, FTP, LDAP n http (reverse proxy method and WeBapps ) n Netbios (datashare, users on SMB et RPC) n NTP, Pop 3, telnet n Small services (chargen, echo…) SMTP, SNMP, SSH
  • 4. Accuracy n Comprehensive vulnerability knowledge base incorporating thousands of unique checks; n Trusted, third-party network security certification with tamper resistant audit trails; n Inference-based scanning engine with non-intrusive scanning techniques; n Both entrusted and authenticated scanning capabilities. n Internal and external scanning provides a 360-degree view of network vulnerabilities; n Configurable scans for customized audits; n Unique fingerprints for over 2,000 operating systems, applications and protocols. Reporting n Customizable reports for on demand reporting by a business unit for executives and managers; n Automated trending and differential report; n Remediation reporting: ticket trending by asset group, user and vulnerability; n Scorecard reports for enterprise stakeholders; n Automated report generation and distribution; n Multiple report distribution options. Evolution n On demand SaaS technology allows users to scan globally with no additional infrastructure; n Fast scanning through load balancing of scanner appliances; n User definable Business Units and Asset Groups that tie into business operations; n End-to-end encryption of vulnerability data; n Hierarchical role-based user access controls allowing delegation of responsibilities to reflect organizational structure; n Policy-based remediation workflow management with automatic trouble ticket creation and assignment. Interoperability n Extensible API XML; n Integration with others SIM, HelpDesk solutions; n Industry standard support for vulnerability scoring with Common Vulnerability Scoring System (CVSS); n Industry standard support for the addition of custom detections using Open Vulnerability Assessment Language (OVAL). ADVANTAGES Support/Maintenance n 24x7x365 live customer support; n Daily signature updates and features enhancement are completed automatically: transparent to the user; n On-going Web-based customer training; n Technical training and certification workshop. Pricing Annual subscription offers an unlimited assessment of a redefined number of IP devices. Ideal for regular security assessment of network assets. Delivery IKare is delivered as a SaaS (Software as a service), both internally and externally; also available in cloud mode from ITrust servers. Starting from an ISO image, IKare is instantly deployed on an existing infrastructure and comes running in minutes. IKare can next be accessed via a simple browser on any platform. n Agentless – no agent to install, n Automatic network and applications discovery, n Minimalist footprint on bandwidth, n Ready-to-connect to your IT via XML-RPC API, n Delivered as well as virtual or physical device, The ITrust security label It independently establishes the security of your information system, according to objective criteria and international standards. The display of this label reassures your clients about the reduction of their overall risk. They would prefer to contract with assessed and labeled suppliers, rather than associate themselves with those who are not. CONTACT Headquarters International Office Address: ITrust, 55 avenue l’Occitane Address: ITrust, 5 rue de Castiglione 31670 Labège Cedex, France 75001 Paris, France Telephone: +33 5 67 34 67 80 Telephone: +33 5 67 34 67 80 Email: sales@itrust.fr Websites www.itrust.fr/en www.ikare-monitoring.com