eThorProtect  

Let eThor Protect YOU!

eThor Protect enables organizations to significantly reduce risk by providing a fully managed, proactive solution to discover and remediate network vulnerabilities on a continuous basis.

Our extensive experience in vulnerability detection and remediation, combined with our leadership in vulnerability research, assures the highest level of remote vulnerability detection available. eThor Protect leverages this expertise in a fully expert-managed implementation. By combining the advanced vulnerability detection accuracy of eThor Protect Technology with the hands-on expertise of our Labs, an unparalleled level of network perimeter security is achieved.

Our network of distributed scanning servers allows us to reliably perform daily security audits for clients around the world. Each scan appliance is controlled by our central knowledge base and vulnerability management system.

Vulnerability Scan Steps

  • port discovery scan
  • network services vulnerability scan
  • web application scan
  • alerting
  • analysis and remediation

Once these steps are completed and the web site's current security status meets the highest published government standards will the eThor Protect mark appear.

Safer shopping platform results in more customers!