Cyber Asset Attack Surface Management (CAASM)
FortiScanner Cloud provides device visibility for internal corporate networks, cataloging assets and offering insights into potential vulnerabilities
Try free for 90 daysThe FortiScanner CAASM cloud-service provides comprehensive visibility into corporate networks, identifying security gaps by merging asset, software, and vulnerability data. This allows security operations teams to proactively minimize threats and protect against attacks by identifying weaknesses and misconfigurations.
FortiScanner Cloud provides comprehensive security visibility across corporate networks, identifying security gaps in both managed and unmanaged systems. Through a dashboard accessible from anywhere, it allows you to view device health and status. FortiScanner Cloud consolidates asset, network, user, software, and vulnerability data to identify weaknesses and protect against potential attacks.
FortiScanner Cloud provides easily readable and searchable device inventories, allowing you to drill down into asset details, including vulnerabilities, software, services, and screenshots. Reports enable users to quickly identify compromised assets with high vulnerabilities and offer additional information such as the switch and port the device is connected to.
Users can configure scan intervals, defining each scan setup by site and subnet, with scan rates adjustable hourly, daily, weekly, or monthly. Scanning against servers (SSH, SNMP, Telnet, VMware) is performed using provided authentication credentials. The system then collects information about the system, applications, and software running, correlating this data with vulnerability analysis. Based on the FortiCloud AMI, multi-tenant accounts are supported. Detectors, which require one per subnet, discover assets, vulnerabilities, software, and services. User-installed detectors support Windows, Linux, and MacOS.
Increased visibility
Performs active scanning and passive discovery with no impact to devices or the network
Posture Assessment
Identifies systems lacking security measures or absent from vulnerability management programs
Exposure management
Protects against potential threats by identifying weaknesses, misconfigurations, and hazards