Network Service Vulnerabilities
This report enumerates known network services, such as Apple Bonjour, Cisco NetFlow, and Samba. The report displays information for enforcing and verifying IT management policies relating to assets,...
View ArticleVulnerability Trending with Scanning, Sniffing and Logging
With the introduction of the Log Correlation Engine 4.2, vulnerabilities and systems can now be discovered through log analysis. This report leverages log analysis discovery along with Nessus scanning...
View ArticleApplication Development Vulnerabilities
This report enumerates known application development software, such as VBScript, Xcode, and Java Development Kit. The report displays information for enforcing and verifying IT management policies...
View ArticleApple Vulnerabilty Report
This report enumerates known Apple Vulnerabilities, such as Desktop Applications, Operating System, and Hardware. The report displays information for enforcing and verifying IT management policies...
View ArticleApache Vulnerability Report
This report enumerates known Apache Vulnerabilities, such as PHP, Web Development, and Collaboration. The report displays information for enforcing and verifying IT management policies relating to...
View ArticleMedia Player Vulnerabilty Report
This report enumerates known Media Player Vulnerabilities, such as Apple iTunes, Cisco Video Surveillance, and Adobe Media Player. The report displays information for enforcing and verifying IT...
View ArticleDatabase Software Vulnerabilities
This report enumerates known databases and resources, such as Microsoft SQL Server, MySQL, and Oracle. The report displays information for enforcing and verifying IT management policies relating to...
View ArticleAdobe Software Vulnerabilities
This report enumerates known software developed by Adobe, such as Reader, Flash Player, Shockwave, and AIR. The report displays information for enforcing and verifying IT management policies relating...
View ArticleDesktop Application Vulnerability Report
This report enumerates known Desktop Application Vulnerabilities, such as Cisco Access Server, Microsoft Remote Desktop Connection, and Oracle Enterprise. The report displays information for enforcing...
View ArticleCisco Software Vulnerabilities
This report enumerates known software & hardware manufactured by Cisco Systems, such as router IOS, VPN client and collaboration suites. The report displays information for enforcing and verifying...
View ArticleEnterprise Application Vulnerability Report
This report enumerates known Enterprise Application Vulnerabilities, such as Cisco Access Server, Microsoft Remote Desktop Connection, and Oracle Enterprise. The report displays information for...
View ArticleEMC Software Vulnerabilities
This report enumerates known software and hardware manufactured by EMC2, such as EMC2 NetWorker Module, VMware ESXi, and RSA Authentication Client. The report displays information for enforcing and...
View ArticleOracle Software Vulnerabilities
This report enumerates known software and hardware manufactured by Oracle, such as Sun Servers, Java, database, and web technologies. The report displays information for enforcing and verifying IT...
View ArticleIBM Software Vulnerabilities
This report enumerates known hardware and software manufactured by IBM, such as DB2, IBM Lotus Domino, and IBM InfoSphere. The report displays information for enforcing and verifying IT management...
View ArticleHP Software Vulnerabilities
This report enumerates known software and hardware manufactured by HP, such as HP System Management, HP OpenView, and HP Data Protector. The report displays information for enforcing and verifying IT...
View ArticlePCI DSS Indicators Report
The PCI Indicator report provides the information found when using the "PCI DSS Indicators Dashboard". The report is comprised of five chapters, with individual sections containing descriptive...
View ArticleIT-Grundschutz BSI-100-2 Report Template
Required - IT-Grundschutz BSI-100-2 audit file, Nessus, and SecurityCenter 4.6 or higherThe IT-Grundschutz Standards and Catalogues are a set of recommendations designed to assist an organization in...
View ArticleVulnerabilities Over 30 Days Report
This report provides a detailed view of the long-term vulnerability status, by reporting on vulnerabilities older than 30 days. Using SecurityCenter’s advanced cross-referencing functionality, the...
View ArticleEvent Indicator Alert Report
This report provides the event summaries of each system that has been identified to have more than one "indicator" event type. The indicator event is a correlation of specific events associated with...
View ArticleWindows Remediation Report
This report summarizes remediation actions across a series of hosts. Rather than just counting the number of vulnerabilities, applications are listed which need to be upgraded or patched. It also...
View Article