/
Deployment Architecture
Deployment Architecture
The Vulnerability scanner has two parts.
- A Secure Scanner VM that resides on the end network that requires to be scanned. The Secure Scanner VM comes bundled with a vault that stores all the credentials on the customer end and is never transmitted out of the network. Any changes in credentials can be handled locally. Every agent installed is associated with a Company and Site. The Secure Scanner VM runs on a machine in each site and connects to all machines and runs a vulnerability scan and then streams the results to the central cloud servers that are hosted inside of AWS. These are then analysed to provide reports.
- The cloud component that provides APIs and the User Interface to view the results of the scans and also graphical views in dashboards
Related content
Getting Started
Getting Started
Read with this
Scan Threat Intelligence Sourcing
Scan Threat Intelligence Sourcing
More like this
Prerequisite Document
Prerequisite Document
Read with this
CyberCNS Agent types
CyberCNS Agent types
More like this
Welcome to CyberCNS Resources
Welcome to CyberCNS Resources
Read with this
Company Attack Surface Mapper
Company Attack Surface Mapper
More like this