beSECURE Vulnerability Detection System
beSECURE (an Automated Vulnerability Detection System) is a network vulnerability assessment appliance. beSECURE locates and exposes security breaches and vulnerabilities and lists their exact location and description along with suggested solutions. With each scan, beSECURE will automatically find new equipment and services and add them to the inspection schedule. It then tests every active node based on its characteristics and records responses creating a network security baseline. beSECURE can scan all IPs automatically, or schedule tests for specific IP addresses or segments at specific times. Each scan includes the widest range of security tests available today.
Portable Appliance Spesifications
The Portable beSECURE Scanner appliance measures 7.2 x 7 x 1.4 inches and weighs 3 pounds. It has a Intel Pentium G3240T Processor (Dual Core, 3MB, 2.70GHz), 4GB RAM running at 1600MHz and a 500GB 7,200 RPM drive.The dedicated appliance design provides fast scanning and allows the security administrator to focus on performing vulnerability assessments quickly and directly, without the worry of administering an operating system or a disparate suite of tools.
- Easy setup – up and running in minutes
- Self-contained appliance – no integration with your existing hardware required
- No software or agents to install
Focused Reporting
beSECURE standard reports provide a comprehensive analysis of all vulnerabilities found grouped by risk severity. Every detected vulnerability contains technical information specific to that risk, including a short summary, severity, possible impact, recommended solution and relevant information such as links to software vendor patches. An Executive Summary section includes an overall summary for quick assessment of discovered risks.
Differential Reports
Differential reports show changes from the previous scan. New vulnerabilities, open ports, running services or new/removed hosts are listed, as well as a summary of any problems resolved since the last scan. Differential reports are a valuable tool to monitor changes to the security baseline and track remediation efforts over time.
Distributed Architecture for Large Networks
For large networks (from 2,000 to 2 million nodes), beSECURE employs a distributed scanning architecture to effectively scan and manage vulnerability assessment and tracking from a single administration console. Multiple beSECURE appliances on separate networks can connect to a centralized management system for distributed scanning and consolidated report collection
Vulnerability Checks
Features
- Scans unlimited IP ranges to identify active IPs
- Quick Scan feature provides ad-hoc scans within seconds on individual nodes or network segments
- Schedule automatic daily/weekly/monthly scans
- Differential reporting highlights and automatically tests newly added IPs, ports and services
- Powerful search engine–quickly filter and search reported vulnerabilities
- Distributed scanning architecture for large networks and multiple beSECURE appliances with enterprise-wide scans and consolidated reports
- Scan Profiles can check large networks quickly for a small subset of problems
- Non-intrusive and consumes minimal bandwidth. Scan rate can be limited by administrator to control bandwidth requirements
- Web browser administrative interface
- Scales to 2 million active IPs
- Automated daily updates of threat database
- Vulnerability database supplied by SecuriTeam Portal (www.securiteam.com), a industry respected security clearinghouse with over 2 million visits annually and 8,500 online articles
- 24/7 unlimited phone support with access to Beyond Security experts
Penetration Testing Replacement
Many organizations are required to perform periodic penetration testing on their networks and web sites. These tests are intrusive and costly. Further, with the rapid rate new vulnerabilities are discovered, exploited and made available to the hacker community at large, penetration test results can be rendered out of date as soon as they are complete. beSECURE provides results equivalent to most penetration testing procedures, on demand and at a fraction of the cost.
Scanning Performance
Appliance Hardware Spesifications
Requirements
- IE 6.0 or later, Mozilla Firefox 1.5 or later (for administrative console)
- IP address on your internal network