Time for early detection
By using detection modules, IT security incidents and potential risks are displayed as well as monitored at an early stage. With our inhouse-developed detection technologies, customers are benefiting from an effective security concept. Radar Cyber Security delivers awarded excellence in detection & threat intelligence.
Overall more than 67,000 tests are carried out in the categories of OS, software and vulnerabilities using the largest database in the industry. Vulnerabilities are categorized as high, medium or low risk, as well as possible exploit with easy-to-read overviews of the current vulnerability landscape and information ready to meet compliance requirements.
Comprehensive scanning include
Network devices: firewalls/routers/switches (Juniper, Check Point, Cisco, Palo Alto Networks), printers, storage
Virtualization: VMware ESX, ESXi, vSphere, vCenter, Hyper-V, and Citrix Xen Server
Operating systems: Windows, Mac, Linux, Solaris, BSD, Cisco iOS, IBM iSeries
Databases: Oracle, SQL Server, MySQL, DB2, Informix/DRDA, PostgreSQL, MongoDB
Web applications: Web servers, web services, OWASP vulnerabilities
Cloud: scanning of cloud applications and instances like Salesforce and AWS