Verify that the security configuration of your IT assets are set according to your policy and that they stay that way. At the same time, check if your systems are susceptible to the latest known vulnerabilities. Because the best security is to be sure the bad guys can't get in.
Identify and track policy deviations
We provide tools to easily identify and record accepted changes to compliance policies. These deviation profiles are used throughout our products to track and score endpoint compliance posture.
Remediate a local system configuration to meet the requirements of a driving security policy. These settings are derived from the compliance content without any user intervention.
The power of standards
Take advantage of the expert knowledge embodied in the increasing supported compliance (SCAP/XCCDF) and vulnerability standards (OVAL) to protect your assets.
Flexible deployment options
Run assessments from a thumb drive. Take advantage of agents, or go agentless. Install as a standalone server, or on existing servers. Take advantage of your existing enterprise management system.