Ongoing scans, rather than occasional ones, avoid risky delays in security awareness by keeping constant watch utilizing multiple scanning enginies and internal/external scanning.
Information provided by Reach is constantly analyzed in the RootSecure Cloud with threat analysis, anomaly detection and machine learning algorithms that proactively alert you to new risks.
Automatic and continuous mapping, profiling and classification of your network assets builds a comprehensive inventory to enable risk assessment, action prioritization and anomaly detection.
Collect and analyze device logs; for instance, firewall logs let you monitor inbound and outbound connections to detect unauthorized access and understand attack traffic your firewall is successfully discarding.
Software and vulnerability feeds update automatically, for zero-maintance management. The on premise sensor is quickly and easily deployed out-of-band as either a physical applianced or virtual machine.
To maximize security, scanning results are not stored locally. They are securely reported to the RootSecure Cloud and then removed from the local sensors.