Vulnerability Scanners Are Not Created Equal:
How Deep Does Your Scanner Go?

“We know what is on the market. We know that no one else can detect known vulnerabilities as you can. This is an incredibly valuable tool.”

DIRECTOR OF CYBERSECURITY OPERATIONS FOR AN AGENCY OF THE US INTELLIGENCE COMMUNITY

Vulnerability Management: Intruder At Your Door

Studies show that about 80% of intrusions begin with an attack against a known software vulnerability.

Over time, virtually all software spawns known vulnerabilities. These holes allow cyber adversaries to breach even the best maintained and most expensive cybersecurity systems. This is why even prestigious firms get hacked.

Whether the software is delivered with known vulnerabilities already lurking within, or whether the vulnerabilities appear over time, the problem has always been: How can anyone Detect Known Vulnerabilities (DKV) and close the holes?

Until the invention of AssuredScanDKV®, there was no cost-efficient or reliable way to automatically Detect Known Vulnerabilities.

A Cybersecurity Breakthrough

AssuredScanDKV® automatically scans the libraries, DLLs and executables for known vulnerabilities. It also unpacks these software elements to review the binaries.

The scan produces a catalog of prioritized software vulnerabilities and the necessary information to address remediation. Quick and efficient, it does all this in background mode, without significant user intervention.

Plays Well with Others

  • Does not replicate or replace network scanners, good code practice scanners or any other type of scanner.
  • Compatible with Vulnerability Manager/Dashboard tools on the market.
  • Assured has a dynamic database management system capable of integrating international or proprietary data.

These deep software scans can be performed on a single workstation or across your entire network enterprise. Upon completion of the scans, Assured identifies the vulnerabilities, prioritizes their criticality, and outlines the appropriate remediation to eliminate each vulnerability.

The Undeniable Proof

  • Performs as promised, detecting known vulnerabilities in software that other scanning tools miss.
  • Only system that detects known vulnerabilities in packed software executables and libraries.
  • Does not need access to the original source code nor any user data.
  • Makes use of the National Vulnerability Database (NVD) and Assured Enterprises’ proprietary data repository.
  • Approved for use by the US Department of Defense on their most sensitive networks after passing stringent testing and evaluations. DKV has been granted Department of the Navy Application and Database Management System (DADMS) approval for use on systems up to the Top Secret/SCI
  • Available in both workstation and enterprise versions on multiple operating systems.

DoD tested, quick installation, direct and time- efficient training and an array of available support services, make AssuredScanDKV® a crucial component of mission critical systems.

Are you ready to protect your data, safeguard your secrets and preserve your clients’ trust?

Schedule a demo today to assure a brighter tomorrow.

Attacks against known software vulnerabilities
AssuredScanDKV™ OS Network Scanning

Specifications

Operating System

  • Microsoft Windows® 10 and Windows 10® Pro (32-bit and 64-bit)*
  • Microsoft Windows® 8 and Windows 8® Pro (32-bit and 64-bit)*
  • Microsoft Windows® 7 (32-bit and 64-bit) with Service Pack 1 or later*
  • Oracle Enterprise Linux 5, 6, 7.x*
  • Red Hat Enterprise Linux 5, 6, 7.x*
  • Ubuntu 14.x, 15.x, 16.x*

* Requires JAVA Standard Edition (SE) Runtime Environment 8

Processor

  • For Windows 10/8/7: Minimum 1 GHz processor
  • For Linux: Minimum 1 GHz processor

RAM

  • For Windows 10: minimum of 2 GB
  • For Windows 7/8: minimum of 1 GB
  • For Linux: minimum of 1 GB

Hard Disk Space

  • 300 MB of available hard disk space