What is Nodeware?
Nodeware is a vulnerability management platform that simplifies and automates the process of vulnerability scanning. Our cloud-delivered solution connects to your assets, regardless of where they reside, and gives you full visibility into the risk that they pose to your organization.
How does it work?
Nodeware works by connecting to your assets, collecting information about the running operating system, services and processes and scanning them for vulnerabilities. It is designed to be lightweight, both in terms of requirements and impact to your environment, so that it can run continuously in the background and provide real-time visibility into connected assets and their risks.
Do I need vulnerability scanning?
It is more important than ever that organizations incorporate vulnerability scanning into their cybersecurity approach as attacks and breaches become more commonplace and continue to target smaller organizations that lack industry compliance requirements and capabilities. Many malicious campaigns target large swathes of the internet at a time, looking for vulnerable systems and services that can be compromised with widely-available exploits.
How often do I need to scan for vulnerabilities?
Generally, it is advised to scan your environment for vulnerabilities on a regular cadence, and after any change to the network or after a new threat is announced. With the pace that networks are growing and vulnerabilities are published, it is becoming the standard to encourage continuous scanning and monitoring, which Nodeware provides. Many insurance companies are now requiring continuous vulnerability scanning.
How does continuous scanning work, will it impact my network?
Nodeware's patent-pending method to scanning allows it to blend into the background and not impact critical systems in ways that make them unavailable. Continuous scanning does not mean constant scanning, the only part of the Nodeware system that runs all the time is the inventory process that detects new and unknown assets, and determines the availability of known assets for scanning. Nodeware will attempt a full scan of each asset once a day to ensure coverage of the latest threats and provide real-time views into your network and assets.
I've had vulnerability scans run before, after hours. Can Nodeware be scheduled?
Traditional vulnerability scans tend to run end-to-end on your network and generate a large amount of traffic during the discovery and vulnerability scanning phases. They also miss key assets such as employee laptops, phones, and other devices that leave the network or are shut off at the end of the workday.
Nodeware was designed from the ground up to work differently. We constantly work on fine tuning the inventory, fingerprint, and vulnerability scans to have no user observable impact on the network or the assets being scanned. Because of this, Nodeware creates its own schedule based on asset availability and can be run 24/7, ensuring it sees all assets, not just the ones online after hours.
How do I get started?
You can get started with Nodeware by purchasing a subscription or starting a trial, either directly from us or through one of our partners. Visit nodeware.com to learn more.
Once you have created an account, check out the Getting Started Guide in this section for next steps in your deployment.