GFI LANGuard Network Security Scanner
February 01, 2006
$495 for up to 32 addresses
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Very flexible. Many options on scan profiles. Many ways to configure the scanning and analysis options.
- Weaknesses: Unclear or incorrect documentation, limited scan results, and confusing interface.
- Verdict: Powerful scanner, although some quirks take getting used to.
This is a straightforward vulnerability scanner that also manages patch deployment. It can push patches and service packs out to target computers by means of a patch agent installed on the target. We found it generally competent and straightforward to install on our Windows 2000 notebook.
Documentation for NSS comes as a downloadable PDF file. It has several errors that seem to stem from an incomplete conversion from a Microsoft Word document. But it is well-illustrated with screen shots and the installation section is adequate. Support is via the website.However, once the product is installed, it is not intuitive to use. Engineers who are familiar with a wide range of scanners will see much that is familiar, but others will find themselves referring to the manual constantly, a problem because the manual is not always as clear as it should be.
We found the options available on the interface confusing at times and the available scan options were not always clearly explained.
In terms of performance, NSS turned in the fewest identified vulnerabilities of all the products we reviewed by a considerable amount.
The product has many useful features and a scripting language based on Microsoft VisualBasic. The feature set is its strongest point, and scans and patch deployments can be scheduled and the scanner run from the command line. The manual is very brief and was little help to us as we struggled with learning the product.
The scanner can store results in a Microsoft SQLServer (good for large systems) or in an Access database. This choice is configured at install time. Reports are defined using scan filters. Scans can be defined using scan profiles.
This is a capable scanner, but to use it effectively requires spending a fair bit of time playing with it in order to understand its quirks and capabilities.
SC Magazine Articles
- Yahoo breach; State-sponsored actors suspected, at least 500 million accounts affected
- Cybercriminals already able to hack ATM biometric readers
- Education sector bullied by ransomware and can barely defend itself, report
- IoT assault, connected devices increasingly used for DDoS attacks
- Cisco warns of exploitation of new flaws linked to Shadow Brokers exploits
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Hard Rock Hotel & Casino Las Vegas hit with POS breach
- X-ray and MRI machines among devices used as springboards for data breach attacks
- Hacker purportedly selling over 650,000 stolen medical records on dark web marketplace
- Wi-Fi warning! Study finds U.S. unaware of public Wi-fi risks
- RIG EK rigged to steal tricks from Neutrino in fight to fill Angler's void
- SWIFT adds additional protective measures for members to ensure cybersecurity compliance
- 185M incidents bypassed perimeter defenses - report
- Pagers found leaking patient health information
- OVH suffers massive 1.1Tbps DDoS attack