How does F-Secure Radar work?

This discussion has a more recent version.
Katriina_MKatriina_M Posts: 445 F-Secure Employee

As a vulnerability scanning and management solution, F-Secure Radar follows a five-step workflow to secure the system assets in your business network. The workflow runs as follows:

  1. Discovery Radar detects and maps all systems within your network range.
  2. Scanning Radar's scanning engines scan all identified systems for vulnerabilities.
  3. Management The results of the scans can be viewed and managed, such as prioritizing and assigning tasks for remediation.
  4. Reporting Customizable reports can be generated.
  5. Verification This stage involves re-scanning systems, manually or routinely, to ensure proper implementation of fixes.

The Radar Security Center, the centralized dashboard, oversees the entire process and is the central location for you to control, assign, follow, and manage all security issues within the workflow and in-built ticketing system.

Sign In or Register to comment.