The only reason, Nemasis suggest using both internal and external vulnerability scan is to understand the scope of vulnerabilities inside and outside your organization, as threats can emanate from anywhere.
Nemasis Asset tagging feature provides a scalable and flexible way to organize the assets in the network to identify and track data or events of that particular asset.
Nemasis allows fast-track the compliance assessments of network, web application, and infrastructure according to industries standard and best practices such as Center of Internet Security (CIS), Payment Card Industry (PCI), Health Insurance Portability and Accountability Act (HIPAA), OWASP 2017, OWASP 2013 and many more
An authenticated Scan scans the target network from both, external via the network and from the internal via a valid user login.
Nemasis provides an SNMP authentication,SMB authentication, SSH authentication and ESXi authentication scans.
Nemasis PVS plugin is an exclusive network discovery and vulnerability testing software that delivers realtime network profiling and monitoring for constant and continuous assessment of an organization's security demeanor in a non-intrusive manner.It continuously monitors the assets, such as servers, desktops, laptops, network devices,virtual machines,cloud-based assets, and more, that use IP protocol to determine topography, services, and vulnerabilities.
Nemasis dashboard and reports offer a granular representation of vulnerabilities with respect to the CVSS and also provides the total risk scenario for any scan. It also provides statistical data based on days/month/year in a real-time dashboard.
Remediation that track vulnerabilities related to Microsoft patches as they are identified in your environment. Nemasis allows you to report the vulnerability based on various options such as CVSS, Scan plugins, Port/Protocol/Services, and Patches like OS patches, application patches, and more
Nemasis audit trail provides information to analyze the entire trail of events to its origin. It includes user activities, access to data, login attempts, or administrator activities.