netVigilance Internal Scan - Cloud
February 03, 2014
$11,995 for 1,024 IP addresses.
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Cloud-based scanning allows for flexible deployment without the need for additional hardware.
- Weaknesses: No web-based technical support options, such as a knowledge base or user forum.
- Verdict: If the cloud is for you, have a close look at this one
Internal Scan - Cloud Edition from netVigilance offers a full vulnerability testing suite that can scan pretty much anything with an IP address and report on any vulnerabilities. This product supports scanning of operating systems, such as Windows, Linux and Mac, along with servers, routers, switches and TCP/IP services. This scanning capability provides a solid overall picture of security posture throughout the entire enterprise. Aside from the flexible scanning capability, this tool also features a hybrid cloud-based scanning engine. Administrators simply install the scanning agent somewhere within the environment and then run scans from the SecureScout Cloud Service.
This solution features a hybrid cloud deployment so installation is quite simple. To get it running in our environment we had to access our account via the netVigilance website and download the scanning agent. Once we had the agent downloaded and installed on a machine in our environment, we had to follow a few short steps to connect it to our cloud account and we were ready to scan. All remaining configuration and scan setup is done via the web-based portal on the netVigilance website. We found this portal to be well-organized with an intuitive navigation structure.
While this product may be simple and lightweight to deploy, it is not light on features and scanning ability. The robust scanning engine is quite responsive even though it is scanning across the internet into the enterprise through the agent. We also found scans to be quite customizable and to include several scan templates. After scans are complete, reports can be easily exported in several formats, including PDF, HTML and CSV.
Documentation was light but effective. We were given two documents with the submission. One was an email that included steps for accessing our account, as well as the getting-started steps for downloading and installing the agent. The other was a short PDF user guide that detailed how to use the netVigilance Cloud Service portal. This included clear, step-by-step instructions and screen shots detailing navigating the portal and configuring scans. Overall, we found what the documentation lacked in size it made up for in content.
With the purchase price, NetVigilance provides full technical and customer support for the first year. This includes eight-hours-a-day/five-days-a-week phone- and email-based technical aid, installation assistance, weekly product updates, product upgrades and report interpretation assistance. After the first year, customers can purchase ongoing help at an additional cost. NetVigilance offers professional services at an additional cost to customers as well, including on-site training and installation, on-site support and 24/7 technical aid.
At a price just shy of $12,000 for 1,024 IP addresses, we found this product to be a good value for the money. We found this product offers flexible scanning options along with excellent scanning templates without the requirement of the purchase of additional hardware. The lightweight scanning agent can be installed easily into several segments of the environment and scans can be conducted from anywhere that has internet access.
SC Magazine Articles
- Industry pros react to Cisco, Fortinet advisories after possible Snowden NSA leak
- USAA members hit with multiple phishing attacks
- Trust exercise: Symantec's new website security expert is reaching out to hacker community
- U.S. government extends offer to protect states from electoral cyberthreats
- Cisco shedding 7% of its workforce
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- Microsoft warns of new, self-propagating ransomware in the wild
- Wendy's POS breach 'considerably' bigger than first thought
- The media becomes the story as hackers focus efforts on news organizations
- Researchers quell Wildfire ransomware with decryption key
- M&A deals bring added cybersecurity risks
- Twitoor first Android malware known to leverage Twitter for command and control
- Juniper confirms leaked "NSA exploits" affect its firewalls, no patch released yet