nCircle announced the Device Profiler 4000 (DP 4000), a high performance vulnerability scanning appliance designed to support vulnerability scanning requirements including web application and SCAP configuration scanning.
Over the last five years, vulnerability scanning, an important and well-established security best practice, has become more complex. With an average of 5,000 new vulnerabilities discovered every year over that period, the sheer number of conditions a vulnerability scanner must check for has exploded. In response to the increasing threat environment, most organizations are scanning a greater percentage of their network devices far more frequently.
Additionally, 70% of security threats are directed at web application vulnerabilities. Protecting web infrastructure requires specific vulnerability scans that evaluate applications for web-specific vulnerabilities such as cross-site scripting, SQL injection and cross-site request forgery.
Even though vulnerability scan requirements continue to escalate, many organizations also find it necessary to restrict scan traffic to limited time windows to preserve network performance and continuity.
The new DP 4000 addresses all of these issues and, at the same time, doubles the scan speed of current hardware. The DP 4000 has been optimized to include SCAP configuration compliance scanning and vulnerability scanning in the same infrastructure, dramatically reducing the total cost of ownership.
The nCircle DP 4000 is a hardened, 1U rack-mountable scanning appliance that discovers and assesses every IP address on a global network for over 70,000 security conditions. Included in this discovery and assessment are:
- All devices on the network
- All operating systems
- All applications, including web applications
- All open ports
- All protocols
- Virtualized infrastructure
- Operating system and application vulnerabilities
- Web application vulnerabilities
- SCAP-compliant configuration data.
nCircle scanning appliances are security hardened for deployment in the most sensitive networks in the world including critical infrastructure and governmental organizations.