Forum Replies Created
-
AuthorPosts
-
Our support team works out of India. You can reach them via email or the portal I mentioned above. We have a strict SLA that we abide to. I have attached a copy of SLA and EULA for your review.
We are in the process of GDPR evaluation. Though if you see this as an immediate requirement, I will recommend you to choose On-prem deployment, in which case you can deploy within your premises, on a physical or cloud instance.
Our USP is an integrated platform for detection, assessment, prioritization, and remediation of vulnerabilities, misconfigurations, security controls, posture anomalies and other risks, all from one single console. We reduce 90-day assessment/remediation cycles to a daily routine, which is an unrivalled offering to our MSSP customers.
We look at unique devices added on the platform and discovered by our agents.
Certainly, we have the flexibility to create customized groups and add the necessary devices to suit your preferences. While the feature to “disable” a group directly isn’t available, we can efficiently manage groups by either deleting them or removing devices that are no longer required within the group.
On-prem Ancor refers to the SanerNow Application server which comprises of multiple components such as the SCAP Feed content, Analytics and Co-relation Engine, the Viser (UI Console) and the patch repo for 3rd party applications.
Agents are available for download from within the ancor server. They will be downloaded and installed on the target endpoints / servers. It is configured within the same ancor server.
Reports can be filtered by Hostname on the product UI. We also have hostname and IP Address relationship accessible through APIs.
Our APIs can export data in JSON/CSV formats. We do support PDF export as well.
No minimum asset count as such. We only have a minimum monthly bill of USD 200 per month. Which would mean you need to have about 70 devices, in case you subscribe to the full suite of applications/modules. I can share more about pricing on our call.
If we were to talk about best practices from a SanerNow POV, there’s no official documentation now. However, we can make use of the EM, RP and PA modules to gain further traction in combating Zero-Day and Critical vulnerabilities. Please refer to the blog below for additional information regarding SanerNow and Zero-Day Attacks. https://www.secpod.com/blog/custom-scripting-in-sanernow-to-remediate-zero-day-vulnerabilities/
Our agents do a complete OS and 3rd Party Application scan. If there’s anything else you expect, please elaborate your use case here and my team will respond.
One likely outcome is because the communication between the agent and the web socket is interrupted (maybe because of a firewall), causing the agent to turn inactive.
We have a roadmap for BIOS updates yes. By March (Release 6.2) is when we can expect the release of BIOS updates.
-
AuthorPosts