Don’t Let Anyone Come Between You & Your Network

Vulnerability Scanning Finds the Gaps so You Can Fill Them

It’s do or die out there. Cybersecurity is never the same game. Cybercriminals want what you have—information—and they won’t stop until they get it. The bad guys are always lurking, looking for new ways (or repurposing old ones) to infiltrate your network and take anything that will make them money. It is always imperative to stay one step ahead, managing risk and ensuring compliance.

Armor’s vulnerability scanning service puts our clients in control of their network. Keeping them ahead of the next threat through increased visibility, preparedness, and protection. Armor’s service scans internal and external networks for technical vulnerabilities, patching, and compliance issues—providing clients with the ability to mitigate risk and ensure compliance. This vulnerability heads-up can be the difference between an epic cyberbattle success story or a tragedy of Infinity War proportions.

Armor’s vulnerability scanning service is powered by our industry-leading threat prevention and response platform, which not only keeps clients secure but gives them access to the Armor management portal (AMP) scanning console. Through AMP, they can manage their scans and vulnerability reports, review past incidents, and continually monitor compliance results to stop threats before they are attacks. The result? A secure environment that makes compliance easy.

Proactive Security, Block Threats

Keeping Up with the Cybercriminals

Armor doesn’t just secure your network. We monitor and secure your hosts. A defense-in-depth solution that secures your operating system (OS) up to the application layer. Armor’s vulnerability scanning service assesses and reports risk across your entire infrastructure powered by:

  • Lightweight endpoint agent
  • Live dashboards
  • Real risk prioritization
  • IT-integrated remediation projects
  • Cloud, virtual, and container assessment
  • Integrated threat feeds
  • Easy-to-use RESTful API

Vulnerability Scanning Features

  • Weekly Scheduled Vulnerability Scans
    Weekly scheduled scans to identify vulnerabilities in your environment, the patches available to address those vulnerabilities and track your progress towards overall environment health.
  • Vulnerabilites by CVSS and Criticality
    Ranked views of the vulnerabilities hitting your environment that are categorized by CVSS score and criticality. Help your teams prioritize their weekly patching schedules with Armor's weekly vulnerability reports.
  • Detailed Synospis of Vulnerabilities and Exploitable Hosts
    Get detailed summaries of each vulnerability in your environment. See descriptions, related CVEs, host information on affected endpoints, and solution/patching details.

Armor Vulnerability Scanning Delivers Enhanced Security and Eases the Path to Compliance

An external vulnerability scan looks for gaps in your network firewalls, where bad guys can get in and wreak havoc. An internal vulnerability scan operates inside your organization’s firewalls to identify real and potential vulnerabilities in your environment.

Armor external vulnerability scanning service:
Offered for publicly available Armor Anywhere-protected instances on an individual request basis through the Armor ticketing system on AMP.
Schedule scans and through the agent*:

  • Collect the following types of data:
      – Basic asset identification information
      – Windows registry information
      – File version and package information
  • Compress it
  • Submit it back to its cloud

Armor internal vulnerability scanning service:

  • Installs with the Armor agent
  • Performs local scans on the installed asset
  • Reports vulnerability, patching, and compliance results
  • Presents scan results through AMP scanning console

Access output and reports on the Armor security dashboard.

*The agent performs a “Full Audit without Web Spider” scan. A full network audit, it uses only safe checks, including network-based vulnerabilities, patch/hotfix checking, and application-layer auditing.

Making Cloud Security Simple

Armor - The first totally secure cloud company

Shared Responsibility: Who’s in Charge of What?

Since installation and management of the service requires collaboration between the client and Armor, the shared responsibility model applies. The following table gives a brief overview of the breakdown. For more detailed information, please download the Armor Vulnerability Scanning datasheet.

Responsibility Breakdown Armor Client
Provisioning and management of vulnerability scanning service
Availability of vulnerability scanning service portal
Initial configuration of customer account details
Subsequent configuration of environment scan: scope and scheduling
Ongoing scan modification
Remediation of detected vulnerabilities Upon request
Remediation of detected vulnerabilities and disputes in application
Review of reports by Armor’s security operations team Upon request
Application of scan reports to customer audit

Armor Solutions: Making Cloud Security Simple and Effective

Spartan is the IT security industry’s leading threat prevention and response platform. Armor integrates advanced analytics, global threat intelligence, and continuous response capabilities into a single platform that bolsters your defenses, uncovers hidden threats, and prevents security breaches. Whether your sensitive data and workloads are stored in a private, public, or hybrid cloud—or in an on-premise IT environment—Spartan provides a proactive approach to cyberthreats.

Ready for Pricing?

Answer a few questions to get a product recommendation from Armor and pricing estimate in minutes.