|
|
|
|
|
|
Deleting persistent vulnerability
Active response to technological risks and changes
Catching vulnerability caused by changes in info assets
Maintaining the vulnerability analysis system continuously
|
|
|
1. Powerful vulnerability check engine:
It is possible to check various operating systems and network equipment, and check optimized checking items for each OS selectively
2. Convenient usage:
Providing detailed explanations for each vulnerability, and automatically selecting checking items that must be preceded
3. Strong policy editing:
Sophisticated setting is possible befitting the purpose and environment of the user
|