TrustedAgent Scanner

TrustedAgent ScannerTrusted Integration leverages the award-winning SAINTScanner from SAINT Corporation to allow organizations to identify vulnerabilities on network devices, operating systems, desktop applications, Web applications, databases, and more. Where weaknesses are detected, TrustedAgent Scanner recommends fixes before the weaknesses can be exploited. TrustedAgent Scanner also anticipates and prevents common system vulnerabilities and mis-configurations as defined by DISA, FDCC, and USGBC. With TrustedAgent Scanner, organizations can demonstrate compliance with current government and industry regulations such as PCI DSS, NERC, FISMA, SOX, GLBA, and HIPAA.


Highlighted Features supporting TrustedAgent Scanner

  • Vulnerability Scanning :: Scan any target with an IPv4, IPv6, or URL for known vulnerabilities. Get automatic updates with new vulnerability checks and exploits on a daily basis.
  • Penetration Testing :: Exploit vulnerabilities to gain remote access and prove their existence. Includes application, SQL, XSS, and PHP exploits. Run social engineering, phishing assessments, e-mail forgery and more with the exploit tools suite.
  • Configuration Auditing :: Dedicated SCAP module to support focused scanning, analysis, and reporting. Show compliance with DISA, FDCC and USGCB security configuration policies defined by NIST.
  • Policy Editor :: Create custom policies based on NIST benchmark.
  • Continuous Monitoring :: Conduct on-demand or scheduled scanning of assets including operating systems, web applications, and database applications for known and updated vulnerabilities as required for SOX, PCI, GLBA, NERC and others. Determine windows patch compliance, and anti-virus status, or check for stored credit card information, or personally-identifiable information (PII) like social security number or driver license.
  • Integrated Finding Remediation :: Identified findings from TrustedAgent Scanner are automatically brought into TrustedAgent, associated to risk level and impacted assets, and be remedied as corrective actions and milestones under risk remediation.

Back to top

Scroll To Top