Developers: | Cryon |
Last Release Date: | 2024/10/10 |
Technology: | IS - Firewalls |
Main article: Firewall
2024: Opportunity to get an even more complete picture of the company's network perimeter
Kryon on October 10, 2024 announced a large-scale update of the HScan network perimeter scanner.
The updated version of the software allows you to get an even more complete picture of the company's network perimeter and all its possible vulnerabilities.
The solution allows companies to analyze in detail all their own network assets, web applications and get a complete picture of real and potential vulnerabilities in order to eliminate them in time.
HScan is a domestic solution with code that was completely written by Kryon specialists. The scanner runs on a proprietary kernel. In addition, this software does not use third-party solutions, which allows you to ensure the reliability of HScan and its stable operation, regardless of the departure of foreign vendors from the domestic market or any restrictions from outside.
The capabilities of HScan allow you to quickly and efficiently scan the perimeter, inventory assets, draw up a detailed map of the company's network perimeter, get comprehensive information on the presence of vulnerabilities, as well as get practical recommendations for fixing them. A detailed, but at the same time understandable HScan interface, where threats are ranked according to the level of danger, allows users to immediately pay attention to the most critical vulnerabilities. They can be used by cybercriminals to invade the company's IT infrastructure if the vulnerabilities are not closed in time. Flexible role access settings allow security professionals to work together to identify vulnerabilities (including identifying false threats), as well as analyze the results of scanning tasks in retrospect, thanks to detailed logs of each scan performed. Users have access to thoughtful and flexible functionality for working with reports and vulnerabilities.
HScan will be useful to companies of all sizes: from small businesses to large organizations. In addition to constant monitoring of threats, it also allows you to significantly save the time resources of information security specialists by automating scanning processes. Thanks to the open API, companies can easily integrate HScan into their own processes, integrate Hscan with related information security systems, and use scripts to automate processes.
A flexible approach to charging allows companies to choose the amount of scanner use that is most profitable for them and meets the needs of the business, while quickly scaling if necessary. Companies can deploy HScan both locally and in the public or private cloud (including VPS, VDS, physical servers).
As part of the network perimeter protection strategy, it is important to ensure transparency of both the external perimeter and the internal IT infrastructure, taking into account all services and services, as well as their potential vulnerability. This concept applies to both local and external services. Hscan provides up-to-date information for monitoring and managing network perimeter vulnerabilities with minimal load on the information security division, "said Ivan Yeliseyev, developer of the HScan solution, information security engineer Kraion. |