Korean

    
  • Deleting persistent vulnerability
  • Active response to technological risks and changes
  • Catching vulnerability caused by changes in info assets
  • Maintaining the vulnerability analysis system continuously

  •     
    1. Powerful vulnerability check engine:
    It is possible to check various operating systems and network equipment, and check optimized checking items for each OS selectively

    2. Convenient usage:
    Providing detailed explanations for each vulnerability, and automatically selecting checking items that must be preceded

    3. Strong policy editing:
    Sophisticated setting is possible befitting the purpose and environment of the user