McAfee TSA00M005PAA Processor Guide - Page 119

Using the SaaS Vulnerability, Scanning Service

Page 119 highlights

Using the SaaS Vulnerability Scanning Service The SaaS vulnerability scanning service measures the security of websites, domains, and IP addresses by testing them for thousands of risks and issues in many vulnerability classes and categories. It then reports any vulnerabilities detected, prioritizes the risks they present, and recommends remediation tasks and patches. Contents Vulnerability scanning features Certification programs The SaaS vulnerability scanning widget and portal Overview of scanning process Overview of the certification process Types of devices to scan Types of scans Managing scan devices Performing scans How detections are reported Viewing scan results Vulnerability scanning features Run vulnerability scans (device audits) to locate and resolve security risks in your network devices and to confirm compliance with certification standards. A security plan that includes regular and comprehensive device audits: • P rotects your entire network infrastructure non-invasively. • Identifies unauthorized server applications and tracks system configuration changes. • L ooks for thousands of different vulnerabilities residing in Internet services, shopping carts, ports, operating systems, servers, key applications, firewalls, addressable switches, load balancers, and routers. • P rovides detailed reporting and specific recommendations for resolving vulnerabilities detected by more than 10,000 individual vulnerability tests plus port scans. • C ollects and updates vulnerability data around-the-clock from hundreds of sources worldwide, ensuring its ability to detect the latest risks. • M eets the website security vulnerabilities audit requirements mandated by HIPAA, GRAMMLEACH-BILEY, SARBANES-OXLEY, and other federal legislation. McAfee Total Protection Service Product Guide 119

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134

McAfee Total Protection Service Product Guide
119
Using the SaaS Vulnerability
Scanning Service
The SaaS vulnerability scanning service measures the security of websites, domains, and IP
addresses by testing them for thousands of risks and issues in many vulnerability classes and
categories. It then reports any vulnerabilities detected, prioritizes the risks they present, and
recommends remediation tasks and patches.
Contents
Vulnerability scanning features
Certification programs
The SaaS vulnerability scanning widget and portal
Overview of scanning process
Overview of the certification process
Types of devices to scan
Types of scans
Managing scan devices
Performing scans
How detections are reported
Viewing scan results
Vulnerability scanning features
Run vulnerability scans (device audits) to locate and resolve security risks in your network
devices and to confirm compliance with certification standards.
A security plan that includes regular and comprehensive device audits:
Protects your entire network infrastructure non-invasively.
Identifies unauthorized server applications and tracks system configuration changes.
Looks for thousands of different vulnerabilities residing in Internet services, shopping carts,
ports, operating systems, servers, key applications, firewalls, addressable switches, load
balancers, and routers.
Provides detailed reporting and specific recommendations for resolving vulnerabilities
detected by more than 10,000 individual vulnerability tests plus port scans.
Collects and updates vulnerability data around-the-clock from hundreds of sources
worldwide, ensuring its ability to detect the latest risks.
Meets the website security vulnerabilities audit requirements mandated by HIPAA, GRAMM-
LEACH-BILEY, SARBANES-OXLEY, and other federal legislation.