OUTSCAN Description

Outpost24 Netsec solutions can be used to identify, categorize and manage network-attached Information Technology assets. They also report on security vulnerabilities like insecure system configurations and missing security updates. Customers can choose how often they want to assess their IT assets. Assessments are used to inform support operations teams about recommendations for remediation or mitigation. After the vulnerability has been fixed, users can re-evaluate the IT asset to confirm that it is still vulnerable. Security teams use the results to assess compliance and reduce enterprise risk. Customers of Outpost24 pay an annual subscription for Netsec. The service scope is determined by the number and frequency of IP addresses that need to be assessed and, optionally, the number of HIAB virtual devices that have been licensed.

Pricing

Free Trial:
Yes

Integrations

No Integrations at this time

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Outpost24
Year Founded:
2001
Headquarters:
Sweden
Website:
outpost24.com/service-description/netsec

Media

Recommended Products
User Testing Platform | Testeum Icon
User Testing Platform | Testeum

Get worldwide testers to review your software, app or website! Quickly find bugs and usability issues in less than 48 hours.

Tired of bugs and poor UX going unnoticed despite thorough internal testing? Testeum is the SaaS crowdtesting platform that connects mobile and web app creators with carefully selected testers based on your criteria.
Learn More

Product Details

Platforms
SaaS
Type of Training
Documentation
Live Online
In Person
Customer Support
Phone Support
Online

OUTSCAN Features and Options

Cybersecurity Software

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

OUTSCAN User Reviews

Write a Review
  • Previous
  • Next