Welcome!

Cloud Expo Authors: Yeshim Deniz, Esmeralda Swartz, Pat Romanski, Carmen Gonzalez, Roger Strukhoff

Related Topics: Cloud Expo

Cloud Expo: Article

iScan Online Brings Opportunistic Scanning from the Cloud to the Endpoint

Security Scanning Company Debuts with Scan Any Device, Anytime, Anywhere Capability

iScan Online (www.iscanonline.com), pioneers of opportunistic security scanning from the cloud to any device, anytime, anywhere officially launched today. The company has been in stealth mode since June 2012 and made its SaaS, cloud-based security scanning solution available on a limited pre-release basis. iScan Online fills the growing gap in security scanning as BYOD, remote workers and mobile technology create challenges that traditional security scanners cannot meet.

iScan Online was co-founded by Carl Banzhof and Billy Austin, both renowned security industry veterans with experience helping to guide leading security companies, including Citadel Security, SAINT and McAfee. Banzhof serves as Chief Executive Officer and Austin as President. The company has secured seed capital from a strategic investor who understands the important problem iScan Online is solving.

"Traditional vulnerability scanners, focused purely on infrastructure devices, do not provide enough context to help organizations prioritize their efforts," stated Mike Rothman of analyst firm Securosis, in the firm's recent Vulnerability Management Evolution research paper.

"Compliance demands that we scan all devices with access to private/sensitive/protected data...the scanner must be able to scan your environment quickly and effectively, whether that is 200 or 200,000 devices."

iScan Online fulfills all of these requirements for next generation security scanning.

"Today the status quo has changed. We live in a world of branch offices, remote workers, BYOD, transient and mobile users that make up the dark matter of our networks," said Banzhof. "These dark matter devices have been unreachable by IT security but actively embraced by malicious outsiders.

iScan Online delivers the next generation of security technology required to secure these devices."

To date, iScan Online is the first and only vendor to perform internal PAN, PCI and Vulnerability scanning without installing complex software or the need for additional hardware. Since offering its scanning technology on a limited pre-release basis in September, thousands of endpoints have been scanned using iScan Online.

Products currently offered include:

  • iScan Online Cloud Apps, which deliver online scanning via native web browser plug-ins or as a command line executable for Windows and Mac OS X.
  • iScan Online Cloud Console for managing device security and compliance scans.
  • iScan Online RESTful API for integration with 3rd party solutions.
  • iScan Online for Mobile - currently in development will provide security scanning and device management of smartphones and tablets via Android and iOS mobile apps.

In addition to scanning for a full range of vulnerabilities and for specific regulatory compliance mandates (PCI, HIPAA), iScan Online also provides data discovery scans that can detect specific data types including PAN (primary account / credit card numbers), social security numbers or user defined data such as customer records, financial documents etc.

iScan Online's patent pending scan delivery technology allow organizations to leverage their existing IT infrastructure to assess devices anytime and anywhere users are accessing network resources. By combining the iScan Online Cloud Apps with a web application, Microsoft Active Directory or an existing Remote Monitoring and Management or Systems management solution organizations can achieve greater visibility and control over the devices accessing their network resources.

By utilizing the multi-tenant SaaS/Cloud model, the ability to embed the iScan Cloud App in a branded web site and the option of customizing the iScan Cloud Console, the solution is a great fit for MSPs and other 3rd party integrators to offer a critical security and compliance service to their existing products.

About iScan Online

iScan Online is pioneering the use of opportunistic scanning on any device, any time, anywhere. iScan Online scans for vulnerabilities, regulatory compliance and data discovery on Mac, Windows and Mobile devices. Based in Dallas, Texas, iScan Online is available via its website and through iScan Online partners. For more information and a free trial scan visit http://www.iscanonline.com.

More Stories By Daniel Keeney

Dan Keeney is the president of DPK Public Relations, which represents PULSE, The Aldridge Company, Schipul - The Web Marketing Company, Society for Heart Attack Prevention and Eradication, ERHC Energy, Saint Arnold Brewing Company, Arocha Hair Restoration among other companies. Specialties include helping organizations increase their positive visibility and establish and strengthen relationships with influencers in their markets.

@CloudExpo Stories
SYS-CON Events announced today that Verizon has been named "Gold Sponsor" of SYS-CON's 15th International Cloud Expo®, which will take place on November 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Verizon Enterprise Solutions creates global connections that generate growth, drive business innovation and move society forward. With industry-specific solutions and a full range of global wholesale offerings provided over the company's secure mobility, cloud, strategic network...
SimpleECM is the only platform to offer a powerful combination of enterprise content management (ECM) services, capture solutions, and third-party business services providing simplified integrations and workflow development for solution providers. SimpleECM is opening the market to businesses of all sizes by reinventing the delivery of ECM services. Our APIs make the development of ECM services simple with the use of familiar technologies for a frictionless integration directly into web applicat...
Ixia develops amazing products so its customers can connect the world. Ixia helps its customers provide an always-on user experience through fast, secure delivery of dynamic connected technologies and services. Through actionable insights that accelerate and secure application and service delivery, Ixia's customers benefit from faster time to market, optimized application performance and higher-quality deployments.
Blue Box has closed a $10 million Series B financing. The round was led by a strategic investor and included participation from prior investors including Voyager Capital and Founders Collective, as well as the Blue Box executive team. This round follows a $4.3 million Series A closed in December of 2012 and led by Voyager Capital. In May of this year, the company announced general availability of its private cloud as a service offering, Blue Box Cloud. Since that release, the company has dem...
The only place to be June 9-11 is Cloud Expo & @ThingsExpo 2015 East at the Javits Center in New York City. Join us there as delegates from all over the world come to listen to and engage with speakers & sponsors from the leading Cloud Computing, IoT & Big Data companies. Cloud Expo & @ThingsExpo are the leading events covering the booming market of Cloud Computing, IoT & Big Data for the enterprise. Speakers from all over the world will be hand-picked for their ability to explore the economic...
Cloudwick, the leading big data DevOps service and solution provider to the Fortune 1000, announced Big Loop, its multi-vendor operations platform. Cloudwick Big Loop creates greater collaboration between Fortune 1000 IT staff, developers and their database management systems as well as big data vendors. This allows customers to comprehensively manage and oversee their entire infrastructure, which leads to more successful production cluster operations, and scale-out. Cloudwick Big Loop supports ...
To manage complex web services with lots of calls to the cloud, many businesses have invested in Application Performance Management (APM) and Network Performance Management (NPM) tools. Together APM and NPM tools are essential aids in improving a business’s infrastructure required to support an effective web experience… but they are missing a critical component – Internet visibility. Internet connectivity has always played a role in customer access to web presence, but in the past few years use...
SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, will discuss how SAP and partners provide cloud and hybrid cloud solutions as well as real-time Big Data offerings that help companies of all sizes and industries run better. SAP launched an application challenge to award the most innovative SAP HANA and SAP ...
Software AG helps organizations transform into Digital Enterprises, so they can differentiate from competitors and better engage customers, partners and employees. Using the Software AG Suite, companies can close the gap between business and IT to create digital systems of differentiation that drive front-line agility. We offer four on-ramps to the Digital Enterprise: alignment through collaborative process analysis; transformation through portfolio management; agility through process automation...
What are the benefits of using an enterprise-grade orchestration platform? In their session at 15th Cloud Expo, Jeff Tegethoff, CEO of Appcore, and Kedar Poduri, Senior Director of Product Management at Citrix Systems, will take a closer look at the architectural design factors needed to support diverse workloads and how to run these workloads efficiently as a service provider. They will also discuss how to deploy private cloud environments in 15 minutes or less.
Headquartered in Santa Monica, California, Bitium was founded by Kriz and Erik Gustavson. The 1,500 cloud-based application using Bitium’s analytics, app management, and single sign-on services include bug trackers, customer service dashboards, Google Apps, and social networks. The firm states website administrators can do multiple tasks online without revealing passwords. Bitium’s advisors include Microsoft’s former CMO and the former senior vice president of strategy, the founder and CEO of Li...
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace. ...
StackIQ offers a comprehensive software suite that automates the deployment, provisioning, and management of Big Infrastructure. With StackIQ’s software, you can spin up fully configured big data clusters, quickly and consistently — from bare-metal up to the applications layer — and manage them efficiently. Our software’s modular architecture allows customers to integrate nearly any application with the StackIQ software stack.
The Internet of Things (IoT) is going to require a new way of thinking and of developing software for speed, security and innovation. This requires IT leaders to balance business as usual while anticipating for the next market and technology trends. Cloud provides the right IT asset portfolio to help today’s IT leaders manage the old and prepare for the new. Today the cloud conversation is evolving from private and public to hybrid. This session will provide use cases and insights to reinforce t...
Things are being built upon cloud foundations to transform organizations. This CEO Power Panel at 15th Cloud Expo, moderated by Roger Strukhoff, Cloud Expo and @ThingsExpo conference chair, will address the big issues involving these technologies and, more important, the results they will achieve. How important are public, private, and hybrid cloud to the enterprise? How does one define Big Data? And how is the IoT tying all this together?
TechCrunch reported that "Berlin-based relayr, maker of the WunderBar, an Internet of Things (IoT) hardware dev kit which resembles a chunky chocolate bar, has closed a $2.3 million seed round, from unnamed U.S. and Switzerland-based investors. The startup had previously raised a €250,000 friend and family round, and had been on track to close a €500,000 seed earlier this year — but received a higher funding offer from a different set of investors, which is the $2.3M round it’s reporting."...
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
The Industrial Internet revolution is now underway, enabled by connected machines and billions of devices that communicate and collaborate. The massive amounts of Big Data requiring real-time analysis is flooding legacy IT systems and giving way to cloud environments that can handle the unpredictable workloads. Yet many barriers remain until we can fully realize the opportunities and benefits from the convergence of machines and devices with Big Data and the cloud, including interoperability, da...
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. Over the summer Gartner released its much anticipated annual Hype Cycle report and the big news is that Internet of Things has now replaced Big Data as the most hyped technology. Indeed, we're hearing more and more about this fascinating new technological paradigm. ...
In his session at 15th Cloud Expo, Mark Hinkle, Senior Director, Open Source Solutions at Citrix Systems Inc., will provide overview of the open source software that can be used to deploy and manage a cloud computing environment. He will include information on storage, networking(e.g., OpenDaylight) and compute virtualization (Xen, KVM, LXC) and the orchestration(Apache CloudStack, OpenStack) of the three to build their own cloud services.