Our Perimeter Scan helps you stay ahead of cyber criminals. Our regularly updated scan engine identifies external network vulnerabilities so you can keep your data safe. Vulnerability scanning identifies top risks such as misconfigured firewalls, malware hazards, remote access vulnerabilities, and can be used for cyber security or compliance mandates like PCI DSS and HIPAA.
Add and Remove Scan Targets
We realize scan environments change frequently. Our vulnerability assessment tools help you stay on top of dynamic or new IP addresses by adding and removing your own targets through your Perimeter Scan Portal. And, to further simplify the process, you can mass upload scan targets and groups.
IP Target Group Management
For an organization with a high volume of scan targets, keeping port scans organized can be a challenge. Our vulnerability assessment tools allow you to group and label scan targets to make it easier to manage by location, network type, or unique circumstances at your organization.
Scan Targets on Your Schedule
Our Perimeter Scan allows you to test the scan targets you want, when you want. Run port scans on your most sensitive targets more frequently, test in scope PCI targets quarterly, or test designated IPs after changes to your network with simplicity. Perimeter Scan even provides the flexibility to create and manage your own schedule on a group level.
Review Perimeter Scan Results
Each network scan produces a summary report with identified vulnerabilities. Vulnerability scanning reports list the target, vulnerability type, service (e.g., https, MySQL, etc.), and the severity of each vulnerability (low, medium, high). Reports can be downloaded in PDF or an excel file that can be sorted by columns to help in remediation efforts.
Top Reasons To Use Integrated Technology’s Perimeter Scan
Simplified Vulnerability Reporting
Our proprietary vulnerability scanning engines scan for thousands of external network vulnerabilities. Perimeter scan identifies open ports available for data transfer. The port scans report all discovered vulnerabilities and security holes that could enable backdoors, buffer overflows, denial of service, and other types of malicious attacks. Perimeter scan even discovers SQL injection issues specific to your website programming.
Scan The Targets You Want
Because new vulnerabilities are identified daily, organizations are encouraged to regularly use vulnerability assessment tools on their systems. Our perimeter scan clients use scan credits to scan the IP addresses you are most concerned about whenever you want.
Dedicated Network Scan Team
We have a dedicated network scan team whose primary objective is to ensure scan accuracy and so works daily to build, improve and upgrade our proprietary vulnerability scanning engine.
False Positive Reduction
Many network scan vendors provide affordable vulnerability scanning on the surface, but after considering the time you spend resolving false positives, (when a scan engine identifies a threat that’s not real) scan prices quickly add up. At ITG, we continuously adjusts our scanning engines based on trial and customer feedback. This allows for accurate scanning, a reduction in false positives, and customer savings.