How does F-Secure Radar work?

As a vulnerability scanning and management solution, F-Secure Radar follows a five-step workflow to secure the system assets in your business network. The workflow runs as follows:

  1. Discovery Radar detects and maps all systems within your network range.
  2. Scanning Radar's scanning engines scan all identified systems for vulnerabilities.
  3. Management The results of the scans can be viewed and managed, such as prioritizing and assigning tasks for remediation.
  4. Reporting Customizable reports can be generated.
  5. Verification This stage involves re-scanning systems, manually or routinely, to ensure proper implementation of fixes.

The Radar Security Center, the centralized dashboard, oversees the entire process and is the central location for you to control, assign, follow, and manage all security issues within the workflow and in-built ticketing system.

Pricing & Product Info

For product info and pricing please go to the F-Secure product page

Version history
Revision #:
6 of 6
Last update:
‎11-10-2019 06:56 AM
Updated by:
 
Labels (5)