Ongoing scans, rather than occasional ones, avoid risky delays in security awareness by keeping constant watch utilizing multiple scanning engines and internal/external scanning.
Information provided by Reach is constantly analyzed in the RootSecure Cloud with threat analysis, anomaly detection and machine learning algorithms that proactively alert you to new risks.
Automatic and continuous mapping, profiling and classification of your network assets builds a comprehensive inventory to enable risk assessment, action prioritization and anomaly detection.
Collect and analyze device logs; for instance, firewall logs let you monitor inbound and outbound connections to detect unauthorized access and understand attack traffic your firewall is successfully discarding.
Software and vulnerability feeds update automatically, for zero- maintenance management. The on premise sensor is quickly and easily deployed out-of-band as either a physical appliance or virtual machine.
To maximize security, scanning results are not stored locally. They are securely reported to the RootSecure Cloud and then removed from the local sensors.
With Reach, you can understand your cyber security posture and risk profile, make informed decisions, and meet your compliance requirements.
Reach continuously scans your network, cataloging your core infrastructure, equipment/peripherals, workstations, Internet of Things (IoT) and personal (i.e., BYOD) devices –anything IP-connected – and looking for vulnerabilities resulting from misconfigurations, outdated software, and other risk vectors. Reach can also take in logs from other equipment (e.g., firewalls), broadening your visibility into other potential risks.
To ensure maximum insight, Reach leverages both open source and proprietary scanning engines, and an ongoing vulnerability feed keeps Reach up-to-date automatically to detect the latest cyber threats with zero manual maintenance; all information is securely transferred to the RootSecure Cloud for analysis, where you can explore the findings in your RootSecure Dashboard.