Click here to close now.


@CloudExpo Authors: Elizabeth White, Flint Brenton, Liz McMillan, Yeshim Deniz, David Dodd

Related Topics: @CloudExpo

@CloudExpo: Article

iScan Online Brings Opportunistic Scanning from the Cloud to the Endpoint

Security Scanning Company Debuts with Scan Any Device, Anytime, Anywhere Capability

iScan Online (, pioneers of opportunistic security scanning from the cloud to any device, anytime, anywhere officially launched today. The company has been in stealth mode since June 2012 and made its SaaS, cloud-based security scanning solution available on a limited pre-release basis. iScan Online fills the growing gap in security scanning as BYOD, remote workers and mobile technology create challenges that traditional security scanners cannot meet.

iScan Online was co-founded by Carl Banzhof and Billy Austin, both renowned security industry veterans with experience helping to guide leading security companies, including Citadel Security, SAINT and McAfee. Banzhof serves as Chief Executive Officer and Austin as President. The company has secured seed capital from a strategic investor who understands the important problem iScan Online is solving.

"Traditional vulnerability scanners, focused purely on infrastructure devices, do not provide enough context to help organizations prioritize their efforts," stated Mike Rothman of analyst firm Securosis, in the firm's recent Vulnerability Management Evolution research paper.

"Compliance demands that we scan all devices with access to private/sensitive/protected data...the scanner must be able to scan your environment quickly and effectively, whether that is 200 or 200,000 devices."

iScan Online fulfills all of these requirements for next generation security scanning.

"Today the status quo has changed. We live in a world of branch offices, remote workers, BYOD, transient and mobile users that make up the dark matter of our networks," said Banzhof. "These dark matter devices have been unreachable by IT security but actively embraced by malicious outsiders.

iScan Online delivers the next generation of security technology required to secure these devices."

To date, iScan Online is the first and only vendor to perform internal PAN, PCI and Vulnerability scanning without installing complex software or the need for additional hardware. Since offering its scanning technology on a limited pre-release basis in September, thousands of endpoints have been scanned using iScan Online.

Products currently offered include:

  • iScan Online Cloud Apps, which deliver online scanning via native web browser plug-ins or as a command line executable for Windows and Mac OS X.
  • iScan Online Cloud Console for managing device security and compliance scans.
  • iScan Online RESTful API for integration with 3rd party solutions.
  • iScan Online for Mobile - currently in development will provide security scanning and device management of smartphones and tablets via Android and iOS mobile apps.

In addition to scanning for a full range of vulnerabilities and for specific regulatory compliance mandates (PCI, HIPAA), iScan Online also provides data discovery scans that can detect specific data types including PAN (primary account / credit card numbers), social security numbers or user defined data such as customer records, financial documents etc.

iScan Online's patent pending scan delivery technology allow organizations to leverage their existing IT infrastructure to assess devices anytime and anywhere users are accessing network resources. By combining the iScan Online Cloud Apps with a web application, Microsoft Active Directory or an existing Remote Monitoring and Management or Systems management solution organizations can achieve greater visibility and control over the devices accessing their network resources.

By utilizing the multi-tenant SaaS/Cloud model, the ability to embed the iScan Cloud App in a branded web site and the option of customizing the iScan Cloud Console, the solution is a great fit for MSPs and other 3rd party integrators to offer a critical security and compliance service to their existing products.

About iScan Online

iScan Online is pioneering the use of opportunistic scanning on any device, any time, anywhere. iScan Online scans for vulnerabilities, regulatory compliance and data discovery on Mac, Windows and Mobile devices. Based in Dallas, Texas, iScan Online is available via its website and through iScan Online partners. For more information and a free trial scan visit

More Stories By Daniel Keeney

Dan Keeney is the president of DPK Public Relations, which represents PULSE, The Aldridge Company, Schipul - The Web Marketing Company, Society for Heart Attack Prevention and Eradication, ERHC Energy, Saint Arnold Brewing Company, Arocha Hair Restoration among other companies. Specialties include helping organizations increase their positive visibility and establish and strengthen relationships with influencers in their markets.

@CloudExpo Stories
As organizations shift towards IT-as-a-service models, the need for managing & protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection & E-Discovery of your data - whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise.
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, San...
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Ben Perlmutter, a Sales Engineer with IBM Cloudant, demonstrated techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, faster user e...
SYS-CON Events announced today that Catchpoint, a global leader in monitoring, and testing the performance of online applications, has been named "Silver Sponsor" of DevOps Summit New York, which will take place on June 7-9, 2016 at the Javits Center in New York City. Catchpoint radically transforms the way businesses manage, monitor, and test the performance of online applications. Truly understand and improve user experience with clear visibility into complex, distributed online systems.Founde...
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace. Traditional approaches for driving innovation are now woefully inadequate for keeping up with the breadth of disruption and change facin...
I recently attended and was a speaker at the 4th International Internet of @ThingsExpo at the Santa Clara Convention Center. I also had the opportunity to attend this event last year and I wrote a blog from that show talking about how the “Enterprise Impact of IoT” was a key theme of last year’s show. I was curious to see if the same theme would still resonate 365 days later and what, if any, changes I would see in the content presented.
The revocation of Safe Harbor has radically affected data sovereignty strategy in the cloud. In his session at 17th Cloud Expo, Jeff Miller, Product Management at Cavirin Systems, discussed how to assess these changes across your own cloud strategy, and how you can mitigate risks previously covered under the agreement.
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Most of the IoT Gateway scenarios involve collecting data from machines/processing and pushing data upstream to cloud for further analytics. The gateway hardware varies from Raspberry Pi to Industrial PCs. The document states the process of allowing deploying polyglot data pipelining software with the clear notion of supporting immutability. In his session at @ThingsExpo, Shashank Jain, a development architect for SAP Labs, discussed the objective, which is to automate the IoT deployment proces...
Culture is the most important ingredient of DevOps. The challenge for most organizations is defining and communicating a vision of beneficial DevOps culture for their organizations, and then facilitating the changes needed to achieve that. Often this comes down to an ability to provide true leadership. As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ab...
In his General Session at DevOps Summit, Asaf Yigal, Co-Founder & VP of Product at, explored the value of Kibana 4 for log analysis and provided a hands-on tutorial on how to set up Kibana 4 and get the most out of Apache log files. He examined three use cases: IT operations, business intelligence, and security and compliance. Asaf Yigal is co-founder and VP of Product at log analytics software company In the past, he was co-founder of social-trading platform Currensee, which...
Countless business models have spawned from the IaaS industry – resell Web hosting, blogs, public cloud, and on and on. With the overwhelming amount of tools available to us, it's sometimes easy to overlook that many of them are just new skins of resources we've had for a long time. In his general session at 17th Cloud Expo, Harold Hannon, Sr. Software Architect at SoftLayer, an IBM Company, broke down what we have to work with, discussed the benefits and pitfalls and how we can best use them ...
We all know that data growth is exploding and storage budgets are shrinking. Instead of showing you charts on about how much data there is, in his General Session at 17th Cloud Expo, Scott Cleland, Senior Director of Product Marketing at HGST, showed how to capture all of your data in one place. After you have your data under control, you can then analyze it in one place, saving time and resources.
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
DevOps is about increasing efficiency, but nothing is more inefficient than building the same application twice. However, this is a routine occurrence with enterprise applications that need both a rich desktop web interface and strong mobile support. With recent technological advances from Isomorphic Software and others, rich desktop and tuned mobile experiences can now be created with a single codebase – without compromising functionality, performance or usability. In his session at DevOps Su...
As organizations realize the scope of the Internet of Things, gaining key insights from Big Data, through the use of advanced analytics, becomes crucial. However, IoT also creates the need for petabyte scale storage of data from millions of devices. A new type of Storage is required which seamlessly integrates robust data analytics with massive scale. These storage systems will act as “smart systems” provide in-place analytics that speed discovery and enable businesses to quickly derive meaningf...
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
In his General Session at 17th Cloud Expo, Bruce Swann, Senior Product Marketing Manager for Adobe Campaign, explored the key ingredients of cross-channel marketing in a digital world. Learn how the Adobe Marketing Cloud can help marketers embrace opportunities for personalized, relevant and real-time customer engagement across offline (direct mail, point of sale, call center) and digital (email, website, SMS, mobile apps, social networks, connected objects).
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...