Deployment Architecture
The Vulnerability scanner has two parts.
- A Secure Scanner VM that resides on the end network that requires to be scanned. The Secure Scanner VM comes bundled with a vault that stores all the credentials on the customer end and is never transmitted out of the network. Any changes in credentials can be handled locally. Every agent installed is associated with a Company and Site. The Secure Scanner VM runs on a machine in each site and connects to all machines and runs a vulnerability scan and then streams the results to the central cloud servers that are hosted inside of AWS. These are then analysed to provide reports.
- The cloud component that provides APIs and the User Interface to view the results of the scans and also graphical views in dashboards