Network Vulnerability Scanning


GTIS Vulnerability Management allows you to manage a prioritized list of vulnerabilities, understand how to fix them and produce reports detailing and verifying your remediation progress over time. Why do businesses choose GTIS over the competition for vulnerability scanning and management?

  • Application of threat data from GTIS SpiderLabs’ industry-leading research
  • Significantly fewer false positives and increased scan efficiency
  • Centralization of both internal and external scanning management
  • Integration with a number of GTIS products and services including, Compliance Manager and Unified Threat Management (UTM)


Context-driven Scanning

Using OS, protocol and application fingerprinting and other gathered knowledge to target vulnerabilities directly, GTIS Vulnerability Manager significantly reduces false positives, decreases the time it takes for a scan to complete and allows for the effective assessment of applications with non-default installations.

Powered by GTIS SpiderLabs

To protect against next-generation threats, our scanning technology applies threat data gleaned from GTIS SpiderLabs experts’ proprietary research, including incident response and forensics cases, penetration testing and malware analysis.

Flexible, Continual Scanning

Scans can be run ad-hoc or at regular intervals to identify new risks across the network. Configurable notifications keep you up to date on upcoming scans, scan kick-offs, scan completion and vulnerability dispute status (in bulk or otherwise).

IT Asset Change Control

Compare easily generated reports to detect when a system or network service is added or removed from the environment. Correlate results for tracking of vulnerability trends and asset changes over time to measure the effectiveness of IT remediation processes.

Proprietary Research and Development

Tests and plug-ins written by our dedicated vulnerability scanning research team keep you up to date on emerging threats, reduce false positives and result in more accurate findings.

Risk Assessment

Integration with other GTIS services provides a complete view of vulnerability risk exposure across the organization.


GTIS Vulnerability Manager, housed within the award-winning TrustKeeper portal, provides IT and security professionals with insight into their network vulnerabilities and exposure to attack and/or compromise from outside and inside the corporate firewall

GTIS Vulnerability Manager helps customers meet both IT security objectives – such as protecting confidential data and ensuring the integrity and availability of IT systems – and compliance goals, including auditing security controls to safeguard sensitive information.

GTIS Vulnerability Manager centralizes the management of these processes in the cloud to allow customers to:

  • Demonstrate compliance via audit-ready reporting
  • Stay protected from emerging threats
  • Scan continually to gain real-time insight
  • Monitor networks to understand IT inventory
  • Take immediate action on discovered vulnerabilities with recommendations from GTIS security experts

How It Works

You begin managing the vulnerabilities within your network by logging into the portal to schedule an internal or external scan.

Your scan will begin on the date you select and proceed to execute the following progression:

o    System Discovery

Identifies servers, appliances and other devices on the network.

o    Service Discovery

Identifies the open ports and services available on each discovered system, such as mail and web servers.

o    Vulnerability Detection

Performs tests based on the OS, protocol and application fingerprinting data gathered in the discovery phase.

o    Vulnerability Classification

Scores, ranks and identifies vulnerabilities using the Common Vulnerabilities and Exposures (CVE) dictionary and Common Vulnerability Scoring System (CVSS), industry standards for tracking and calculating vulnerability risks.

o    Reporting

Gathers findings within the portal and prioritizes and organizes them according to your preferences.

o    Management

Sort and track vulnerabilities based on asset class for remediation to make risk reduction efforts actionable.