DenyAll Vulnerability Manager was designed to help you perform these important tasks. To meet the needs of your auditors, security and IT operations teams, it is available in three different form factors : Enterprise Edition as a virtual machine, running in your network, Cloud Edition as a service, simulating a penetration test, and Portable Edition as a USB key, for remote sites.
OVERVIEWAutomated. Comprehensive. Actionable
BENEFITSDiscover why DenyAll Vulnerability Manager is the right solution for you
Large security coverage
Because you want a single all-in-one solution to manage the vulnerabilities of all your IT assets and technologies.
The product for your need
Because you want to scan your external and internal security, including your remote sites and subsidiaries.
Because you may not have dedicated expertise on vulnerability management, the product is very easy to manage.
Because we master both technologies, the integration between scanner and WAF delivers effective virtual patching and more.
Unique reporting efficiency
Because we provide template-based, actionable reports for executives, operational and technical stakeholders.
You keep your data!
Because your security posture is critical information, you keep it and manage it internally, even offline if needed.
FEATURESWith DenyAll Vulnerability Manager, proactively detect IT vulnerabilities to monitor your security posture and minimize your attack surface
All discovered vulnerabilities are classified by process and technology (OS, DB, Web) so the reports are assigned to the right operators for higher efficiency.
Yet, all information are centralized in the master VM which manages remote probes, delegates inventory and scanning tasks while providing a unique repository of your vulnerabilities.
Periodic inventories discover assets and group them. Then, scans identify vulnerabilities in targeted groups or specific devices/websites and send reports to all stakeholders automatically.
Export the scans of your websites to DenyAll Web Application Firewall to optimize its configuration until website vulnerabilities are permanently fixed in the source code.
Form Factor Choice
All three products can be used together and combined so the main VM acts as a central internal repository of your whole IT security posture data, integrating reports from the Cloud and Portable editions.
Whatever form factor is used to scan your infrastructure, all vulnerabilities (external and internal) are gathered at your place, inside your master VM. We do not keep any of your security information.
Reports combine executive level, managerial and technical views, support customizable templates and show evolution (diff) over time. In 4 formats (PDF, XML, CSV, MHT) and multiple languages.
The price scales with your needs, whatever architecture and number of probes you choose to deploy, making a great ROI from the outset. Besides, inventorying your assets is unlimited and free!