QTSEC
Home > Workload Security > Risk Assessment
Risk treatment lifecycle
Functions

Discover uninstalled
critical patches

Continuously updated patch library and agent probe scanning can timely and accurately find important patches that need to be applied to the system. At the same time, in-depth detection of applications, kernel modules, installation packages, etc., all kinds of important software updates in the system, intelligent extraction of urgently needed patches.

Discover security problems caused by application configuration flaws

Automatically identifies application configuration defects and greatly reduces the risk of intrusion by comparing critical attack paths along the attack chain and discovering and dealing with problems in the configuration. Timely detection and handling of a configuration flaw will effectively resolve potential security risks and block further hacker activities.

Rapidly discover new types of vulnerabilities in systems and applications

Continuously focus on global security developments, and vulnerability exploitation methods, and constantly introduce the ability to detect new vulnerabilities. Agent-based continuous monitoring and analysis mechanism, can be quickly compared with a large library of vulnerabilities, accurate and efficient detection of system vulnerabilities.

Intelligent weak password detection, support multiple applications

Accurately identify a dozen applications with weak passwords, including: SSH system applications, Tomcat, Mysql, Redis and so on. Identification methods to offline deciphering priority, and offline file hash into the library, greatly improving the detection efficiency. The system can intelligently identify the combination of weak passwords and support user-defined weak password dictionary.

Functional Features
  • Comprehensive system vulnerability discovery

    Comprehensively detects the vulnerabilities of IT systems, providing enterprises with a dead-end view of the risk situation, discovering security problems before attackers and repairing them in a timely manner.

  • White-box perspective detects risks more accurately than black-box perspective

    Agent's probe-based scanning mechanism creates a white-box view from the inside out, with extremely low false positives and more comprehensive scanning.

  • Faster and more convenient than traditional scanners

    Agent-based scanning from the inside out, a single command can be deployed with a single click, and once deployed, it can continue to protect the security of the enterprise.

  • Automatic correlation of asset data

    Based on a comprehensive inventory of assets in the workload environment, continuous risk scanning and automatic correlation of asset data provide effective information for the next step of risk treatment.