AVDS-I Scanning Capacity Unbound

Beyond Security vulnerability assessment products have been in use around the world since the year 2000 and are now in use around the world and in every industry and level of government.

Vulnerability Assessment is a fundamental security tool that is an important component to every security plan and is required in every security compliance standard.  Automated Vulnerability Detection System (AVDS) is now a product line that that includes applications for every company size, from a single web site or blog page (scanmyserver.com) up to Fortune 100 companies that may have hundreds of business units spanning the globe.

With the addition of AVDSI to the product line Beyond Security now has a SaaS deployment that provides the complete feature set used by our largest customers to every company, regardless of its size or scanning requirements.  Beyond Security provides access to the AVDS scanning controls and the customer can use them to scan web sites, network resources, produce compliance reports (including PCI) and penetration testing tools – all from one interface.

The worldwide public cloud services market is projected to grow 18 percent in 2017 to total $246.8 billion, up from $209.2 billion in 2016, according to Gartner, Inc. The highest growth will come from cloud system infrastructure services (infrastructure as a service [IaaS]), which is projected to grow 36.8 percent in 2017 to reach $34.6 billion. Cloud application services (software as a service [SaaS]) is expected to grow 20.1 percent to reach $46.3 billion.

AWS’ shared responsibility security model guarantees that the underlying cloud infrastructure is secure, reliable and flexible; while customers take responsibility for the security of their own AMI virtual appliance (guest OS and application). Beyond Security’s AVDS vulnerability management platform provides these customers with the ability to efficiently enhance the security posture of the AMI virtual appliance throughout the software development, staging and production lifecycle. The scan data is securely transmitted and analyzed by Beyond Security’s management console so that customers can access the information on-demand whether IT applications are hosted on-premises or in the AWS cloud. 

http://www.gartner.com/newsroom/id/3616417

"Beyond Security has been leveraging AWS's infrastructure to facilitate our growth and provide our users with fast, scalable and secure solutions. We have literally moved all our hardware infrastructure to the AWS cloud and that gives us enormous flexibility to service our customers better. "–Aviram Jenik, CEO

 

Request Info