Customers: Travelex Group Housing and public utilities, service and household services Contractors: Outpost24 Product: Outpost24 OutscanProject date: 2013/09 - 2013/11
|
On November 11, 2013 Outpost24 company announced the choice made by Travelex Group company - for protection of the infrastructure it preferred the solution Outscan Outpost24.
Project Tasks
The main requirements which the Travelex company imposed to the solution for identification and management of vulnerabilities it is reports generation, clear not only to technical specialists, but also management of the company. The Travelex company learned about solutions of Outpost24 company after acquisition of the next financial company which already used the solution Outscan and expressed satisfaction with results of work of this solution.
Before to make the final decision, Travelex tested a product – the results of trial scanning and reports generated by Outscan completely met Travelex expectation – the solution was flexible, easy and convenient in use, it which was required to the company.
The main advantage in Outscan to the company was the fact that software provides reports in a convenient, simple format. For example, reports in the form of charts are clear not only to technical specialists, but also management of the company. The technical command highly appreciated the solution Outscan.
Among other advantages of the product Outscan, the Travelex company selects that the solution does not require difficult deployment - it is possible to start its use immediately and also Travelex noted that Outscan does not require maintenance from user side.
Besides, unlike manual testing, Outscan can execute scanning much more often and more carefully that very important as vulnerabilities are detected every day. The reports generated by Outscan estimate vulnerability on severity of threat and offer candidate solutions. In addition to convenient reports, the Travelex company highly appreciated other opportunities of the solution Outscan, for example, tools which allow to delegate vulnerabilities and to check their correction.