MaxPatrol TM is made for managing vulnerabilities and compliance on corporate information systems. Penetration testing, system checks, and compliance monitoring are at the core of MaxPatrol TM. Together, these mechanisms give an objective picture of the security stance across IT infrastructure as well as granular insight at the department, host, and application level—precisely the information needed to quickly detect vulnerabilities and prevent attacks.
MaxPatrol
Vulnerability and compliance management system
![img](img/partner/maxpatrol-2.png)
- Black-box analysis
- Detect vulnerabilities:
- by analyzing messages (banners)
- by using exploit-like behaviour
- by using heuristic methods
- Web application analysis
- Password brute-forcing
- Network services diagnostics
![img](img/partner/maxpatrol-3.png)
- Uses standard remote access protocols
- Hardware and software inventory
- Check for security updates
- Detection of vulnerabilities and configuration errors
- Configuration analysis
- Account control
- Change control
![img](img/partner/maxpatrol-4.png)
- Automatic determination of compliance with applicable standards
- Support of high-level standards and requirements of regulators:
- Banking information security standard
- PCI DSS
- ISO 27001/27002
- Monitoring implementation of internal corporate rules
Architecture
![img](img/partner/maxpatrol-5.jpg)
The architecture of MaxPatrol TM is flexible: scale up and deploy at companies of any size. Match MaxPatrol TM to your infrastructure by picking the number of servers, scanners, and scanning modes.
On large distributed systems, MaxPatrol Consolidation Server is just the thing. This server aggregates information from multiple MP Server modules for a full portrait of the entire IT infrastructure.