Running from a centralized location, this tool identifies vulnerabilities and categorizes them according to their respective risk levels. It also provides step-bystep solutions to eliminate them, thus simplifying the enormous task of securing Windows operating systems. SWA remotely connects through wireless and wired mediums to machines on the network. After successful authentication, the respective machine is scanned for threats and vulnerabilities.
» GROUP TEST l Risk management Secure Win Auditor v2.0 Skybox 4000 v1.0 reports that display detected Skybox then overlays data from vulnerabilities by name and vulnerability scanners to create category, its associated risk level, the risk analysis. a detailed descriptions of the The user interface has a menu- issues, and the complete speci- driven web-style appearance. ﬁcation of the vulnerability. The Capturing conﬁguration data solution also includes its own from devices can be automatic or internal vulnerability scanner. manual depending on the device. The search capabilities were We really liked the normalized great, allowing admins to quickly view of all the combined con- drill down to detailed vulnerabil- ﬁguration information. ity data to display desired audit The product is sold as client- Vendor Secure Bytes results. There were remediation Vendor Skybox Security side software and deploys on Price $200 for 10 IPs recommendations on the form of Price $7,000 Windows or Linux server Contact www.secure-bytes.com step-by-step solutions to mitigate Contact www.skyboxsecurity.com platforms. There is a server the effect of the vulnerability. component, including a backend ecure Win Auditor There are multiple levels of kybox 4000 v1.0 is an database, a client-side Java-based S (SWA) from Secure Bytes is a security assessment tool that empowers network support available for a fee. Basic support includes phone and email and 24/7 online support. S operational risk manage- ment platform that collects data from various client, and collectors for the col- lection of network data. Eight-hours-a-day/ﬁve-days- administrators and security audi- The solution is sold as client- network assessment tools and a-week support is included with tors to inspect vulnerabilities in side software and deploys on a security products, the product and additional 24/7 Windows-based systems. Windows server running .Net normalizes that options are available for a fee. Running from a centralized and uses a SQL backend. data into a single, This is a nice operational location, this tool identiﬁes vul- This solution supports most common-view user risk management tool. It gives nerabilities and categorizes them standard network and security interface, and provides risk admins a complete view of risk acco
Pages to are hidden for
"Secure Win Auditor v2.0"Please download to view full document