How does F-Secure Radar work?
As a vulnerability scanning and management solution, F-Secure Radar follows a five-step workflow to secure the system assets in your business network. The workflow runs as follows:
Radar detects and maps all systems within your network range.
Radar's scanning engines scan all identified systems for vulnerabilities.
The results of the scans can be viewed and managed, such as prioritizing and assigning tasks for remediation.
Customizable reports can be generated.
This stage involves re-scanning systems, manually or routinely, to ensure proper implementation of fixes.
The Radar Security Center, the centralized dashboard, oversees the entire process and is the central location for you to control, assign, follow, and manage all security issues within the workflow and in-built ticketing system.