F-Secure Radar
F-Secure Radar
Manage business-critical vulnerabilities
F-Secure Radar is a turnkey vulnerability scanning and management platform. It allows you to identify and manage both internal and external threats, report risks, and be compliant with current and future regulations (such as PCI and GDPR compliance). It gives you visibility into shadow IT - to map your full attack surface and respond to critical vulnerabilities associated with cyber threats.
 
 
Radar vulnerability management
 
COMPREHENSIVE VISIBILITY
Effective security mapping through precise discovery and mapping of all assets, systems, and applications on the network and beyond.
 
STREAMLINED PRODUCTIVITY AND SECURITY MANAGEMENT
No more inefficiency and missed security risks. Quickly address problems across multiple domains with an efficient service workflow, including vulnerability monitoring, automated scheduled scans, and ticketing for prioritized remediation and verification.
 
REPORTING ON RISK
Produce reports with credible information about your organization's security posture over time. Show and justify how IT security enables business continuity.
 
REDUCED COSTS
Vulnerability management is an opportunity to significantly lower the cost of security. It's less costly to deal with security before serious problems arise than it is to deal with it during a crisis or incident recovery. Additionally, leveraging Radar's cloud resources allows organizations to lower their expenses.
 
 
What is your attack surface?
 
 
An organization's attack surface is the sum of its IT risk exposure. It crosses all network infrastructure, software, and web applications internally and in the global Internet, and includes an understanding of all points of interaction.
 
F-Secure Radar identifies where your organization's assets are vulnerable, allowing you to minimize your attack surface to reduce risk.
 
With F-Secure Radar, your IT security team maps your organization's attack surface in the aggregate of:
 
  • All known, unknown, and potential vulnerabilities critical to business
  • Controls across all software, hardware, firmware, and networks
  • Shadow IT, external misconfigured systems, malware websites, website-linked hosts
  • Partner and contractor security entropy
  • Brand infringements and phishing

 

F-Secure Radar Security Center

 
Simple on the surface, supercharged under the hood
F-Secure Radar Security Center is your dashboard for all reporting, vulnerability management, and incident remediation. A high level of automation will help you to streamline your workflows, automate scans, and deliver detailed reports tailored to all your users. The Security Center is where you can control and assign, follow and manage all security issues in coordination with system administrators, software developers, testers, auditors, and your security team.
 
Centralized, uniform vulnerability reporting
  • Customizable reports in a variety of formats
  • Vulnerability management and ticketing
  • API interface for 3rd party integration (e.g. ServiceNow)
  • Capability of adding manually identified vulnerabilities
  • Scheduling of scans, and notifications when new hosts and vulnerabilities are detected
 
Discovery Scan
  • Map your attack surface
  • Identify assets for security vulnerabilities scanning and monitor network changes.
  •  
  • A fast, reliable, asynchronous port scanner
  • Fast host discovery mode for internal networks
  • Supports service and OS detection
  • Adjusts scan speed to suit network capacity
 
System Scan
  • Identify known vulnerabilities
  • Identify security vulnerabilities associated with configuration errors, improper patch management, implementation oversights and more.
  •  
  • Identifies all known vulnerabilities
  • Scans any network device that talks IP
  • Supports Windows and Linux authenticated scanning
  • Delivers high accuracy, with low false positives and negatives
  • Stays up to date based on public vulnerability databases as well as vulnerabilities—including zero-day threats—discovered during F-Secure penetration testing
 
Web Scan
  • Test for web application vulnerabilities
  • Scan and detect security vulnerabilities within commercial and custom-built web applications. Test for numerous vulnerabilities, including the OWASP Top 10.
  • A web application scanner that can identify vulnerabilities within custom applications
  • Supports form-based authentication
  • Supports web application crawling
  • Supports assisted crawling and submission of forms
  • Scalable to allow a limitless number of web application scans
 
Internet Asset Discovery
  • Discover external, vulnerable, or misconfigured systems
  • Detect orphaned or shadow systems (shadow IT) and identify potential risk concentration and unintended interdependencies
  • Detect malware-infected websites
  • Monitor phishing and brand infringements to protect your brand and intellectual properties against fraudulent or malicious activities
  • Audit your service providers' security practices, in cases where your own security policies differ from those of a partner
 
PCI Compliance
  • Ensure compliance with current and future regulations
  • F-Secure is qualified as a Payment Card Industry's Approved Scanning Vendor (PCI ASV)
  • F-Secure Radar is compliant with PCI ASV vulnerability scanning requirements
  • Prepare for PCI compliance by running pre-validation scan
  • EU-based partner that complies with EU regulations
  • Carry out regular testing and identify new vulnerabilities
  • Generate user-friendly reports for all users