CheckScan+ is a best-in-class managed vulnerability scanning service.
Delivered as a fully managed IT security service, CheckScan+ provides the capability to carry out regular scans to identify vulnerabilities in your applications and infrastructure that could quickly become a significant business risk.
It can be deployed as a single scanning system or as part of a distributed scanning network, and it offers unparalleled detection rates, accuracy and scalability.
A managed security service to scan web applications for vulnerabilities.
Vulnerabilities within web applications pose a significant threat to your organisation’s network security.
A recent study revealed that cross site scripting (XSS) and SQL injection attacks have increased by more than 30%. In addition, almost half of organisations recently surveyed reported SQL injections as the most serious attacks they have experienced in the past two years.
CheckScan+ can identify all known web application vulnerabilities and provide exploit capabilities to demonstrate their impact and eradicate false positives.
A managed security service to scan IT Infrastructure.
Web application vulnerabilities are not the only threat to your network perimeter. Unpatched software, configuration weaknesses and software vulnerabilities also need to be managed effectively. CheckScan+ includes a vulnerability assessment module to perform vulnerability scans across your external network infrastructure.
Managing Security Vulnerabilities
The CheckScan+ vulnerability management platform enables the team in CommSec, working with you the customer, to manage the vulnerabilities discovered across the business in a variety of ways. CommSec have designed the vulnerability management platform to be completely customisable. CheckScan+ has been specifically designed to enable CommSec to work with you to understand and prioritise the vulnerabilities that matter most to you, and we customise the service to those priorities.
A fully managed service based on sophisticated scanning technology designed by experienced penetration testers.
- Provides a single platform to identify and manage web application and infrastructure risks.
- Offers accurate discovery and analysis of ‘Rich’ Internet Applications via a combined network and browser-based scanning engine.
- Supports complex multistage applications and authentication schemes.
- Confirms vulnerabilities through safe exploitation to eradicate false positives and provide proof of concept.
- Detects critical web application security flaws, as defined by the OWASP Top Ten, e.g. SQL and XSS.
- Supports security strategy with fast, intelligent web crawling and exceptional detection rates.
- Schedule scans to run at any given date and time. Scan at regular recurring intervals with email notifications.
- Generates reports in Microsoft Word and CSV. PCI and UK Government PSN compatible formats.
Accurate and efficient component discovery (crawling) is commonly cited as one of the key challenges when performing an automated web application assessment.
The CheckScan+ scanning engine employs two integrated crawling technologies to overcome this challenge. Our HTTP/HTML based crawler is used to discover components quickly and to identify hidden components through forced browsing. A second integrated crawling engine then executes web pages in the same way a normal browser would. Any embedded scripts or components are then able to run as intended whilst allowing full visibility to the discovery engine. If a modern web browser such as Google Chrome can access the application, our scanning software can crawl it.
- Hooks within our customised browser engine allow the interception and analysis of Ajax calls whilst maintaining accurate client side state.
Sophisticated Assessment Techniques
CheckScan+ has been designed from the ground up to offer the most sophisticated scanning engine available. By working closely with industry leading penetration testers, each scanning module has been designed to maximise detection accuracy whilst minimising false positives.
- Thorough assessment of all known web application vulnerability classes such as those defined within the OWASP top ten.
- Decompilation and static analysis of Adobe Flash files.
- HTML5 postMessage analysis.
- Confirmation of discovered flaws through safe vulnerability exploitation
Advanced, platform agnostic fuzzing technology
CheckScan+ incorporates dynamic fuzzing technology whereby arbitrary protocol structures treated blindly by other scanners as opaque single inputs are broken down accurately into their true and deeper attack surface. For example, cookie values often encode multiple sub parameters using bespoke serialisation encodings (e.g. “the_cookie=1234|65[a=b;c=[1,2,3]]”), and so vulnerable server-side code paths are frequently missed using traditional fuzzing technology.
Eliminate False Positives through Vulnerability Exploitation
A false positive is where a vulnerability scanner indicates there is a vulnerability when in fact there isn’t one. Sorting through scanner results to determine which reported issues are real and which are false positive is a time-consuming process.
To eliminate false positives, and to provide proof of concept evidence, CheckScan+ employs safe custom exploit techniques to actively confirm discovered vulnerabilities.
Microsoft Word and CSV reporting
With CheckScan+ you can download custom filtered results and view via HTML, Docx or CSV. CheckScan+ includes a simple JSON data API for retrieving, aggregating, processing and reporting raw vulnerability data for use in third party applications.
CheckScan+ allows you to create multiple (unlimited) user accounts to allow team collaboration. The system includes workflow management allowing you to assign and prioritise each vulnerability’s remediation to nominated members of the CommSec technical team who are managing your environment, or to nominated members of your own technical team if you wish.
Complex authentication schemes are supported when we are supplied with the minimal information, such as a username and password pair. Optionally, a login URL may be provided to direct the scanner where to use the credentials and for scenarios such as single sign-on.
The scanner may easily be adapted to support bespoke authentication schemes that require non-standard credentials or processes.
CommSec can provide a comprehensive vulnerability assessment and analysis against remote hosts to determine if a misconfiguration exists that could allow an attack to get behind the application and into sensitive data.
Book your free demo here
B109, The Linc,Blanchardstown Institute of Technology, Dublin
+353 1 536 7320