Click here to close now.

Welcome!

CloudExpo® Blog Authors: Elizabeth White, Pat Romanski, David Miller, Liz McMillan, Michael Kanasoot

Related Topics: CloudExpo® Blog

CloudExpo® Blog: Article

iScan Online Brings Opportunistic Scanning from the Cloud to the Endpoint

Security Scanning Company Debuts with Scan Any Device, Anytime, Anywhere Capability

iScan Online (www.iscanonline.com), pioneers of opportunistic security scanning from the cloud to any device, anytime, anywhere officially launched today. The company has been in stealth mode since June 2012 and made its SaaS, cloud-based security scanning solution available on a limited pre-release basis. iScan Online fills the growing gap in security scanning as BYOD, remote workers and mobile technology create challenges that traditional security scanners cannot meet.

iScan Online was co-founded by Carl Banzhof and Billy Austin, both renowned security industry veterans with experience helping to guide leading security companies, including Citadel Security, SAINT and McAfee. Banzhof serves as Chief Executive Officer and Austin as President. The company has secured seed capital from a strategic investor who understands the important problem iScan Online is solving.

"Traditional vulnerability scanners, focused purely on infrastructure devices, do not provide enough context to help organizations prioritize their efforts," stated Mike Rothman of analyst firm Securosis, in the firm's recent Vulnerability Management Evolution research paper.

"Compliance demands that we scan all devices with access to private/sensitive/protected data...the scanner must be able to scan your environment quickly and effectively, whether that is 200 or 200,000 devices."

iScan Online fulfills all of these requirements for next generation security scanning.

"Today the status quo has changed. We live in a world of branch offices, remote workers, BYOD, transient and mobile users that make up the dark matter of our networks," said Banzhof. "These dark matter devices have been unreachable by IT security but actively embraced by malicious outsiders.

iScan Online delivers the next generation of security technology required to secure these devices."

To date, iScan Online is the first and only vendor to perform internal PAN, PCI and Vulnerability scanning without installing complex software or the need for additional hardware. Since offering its scanning technology on a limited pre-release basis in September, thousands of endpoints have been scanned using iScan Online.

Products currently offered include:

  • iScan Online Cloud Apps, which deliver online scanning via native web browser plug-ins or as a command line executable for Windows and Mac OS X.
  • iScan Online Cloud Console for managing device security and compliance scans.
  • iScan Online RESTful API for integration with 3rd party solutions.
  • iScan Online for Mobile - currently in development will provide security scanning and device management of smartphones and tablets via Android and iOS mobile apps.

In addition to scanning for a full range of vulnerabilities and for specific regulatory compliance mandates (PCI, HIPAA), iScan Online also provides data discovery scans that can detect specific data types including PAN (primary account / credit card numbers), social security numbers or user defined data such as customer records, financial documents etc.

iScan Online's patent pending scan delivery technology allow organizations to leverage their existing IT infrastructure to assess devices anytime and anywhere users are accessing network resources. By combining the iScan Online Cloud Apps with a web application, Microsoft Active Directory or an existing Remote Monitoring and Management or Systems management solution organizations can achieve greater visibility and control over the devices accessing their network resources.

By utilizing the multi-tenant SaaS/Cloud model, the ability to embed the iScan Cloud App in a branded web site and the option of customizing the iScan Cloud Console, the solution is a great fit for MSPs and other 3rd party integrators to offer a critical security and compliance service to their existing products.

About iScan Online

iScan Online is pioneering the use of opportunistic scanning on any device, any time, anywhere. iScan Online scans for vulnerabilities, regulatory compliance and data discovery on Mac, Windows and Mobile devices. Based in Dallas, Texas, iScan Online is available via its website and through iScan Online partners. For more information and a free trial scan visit http://www.iscanonline.com.

More Stories By Daniel Keeney

Dan Keeney is the president of DPK Public Relations, which represents PULSE, The Aldridge Company, Schipul - The Web Marketing Company, Society for Heart Attack Prevention and Eradication, ERHC Energy, Saint Arnold Brewing Company, Arocha Hair Restoration among other companies. Specialties include helping organizations increase their positive visibility and establish and strengthen relationships with influencers in their markets.

@CloudExpo Stories
The most often asked question post-DevOps introduction is: “How do I get started?” There’s plenty of information on why DevOps is valid and important, but many managers still struggle with simple basics for how to initiate a DevOps program in their business. They struggle with issues related to current organizational inertia, the lack of experience on Continuous Integration/Delivery, understanding where DevOps will affect revenue and budget, etc. In their session at DevOps Summit, JP Morgentha...
In a recent research, analyst firm IDC found that the average cost of a critical application failure is $500,000 to $1 million per hour and the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year for Fortune 1000 companies. In addition to the findings on the cost of the downtime, the research also highlighted best practices for development, testing, application support, infrastructure, and operations teams.
SYS-CON Events announced today that MetraTech, now part of Ericsson, has been named “Silver Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. Ericsson is the driving force behind the Networked Society- a world leader in communications infrastructure, software and services. Some 40% of the world’s mobile traffic runs through networks Ericsson has supplied, serving more than 2.5 billion subscribers.
The OpenStack cloud operating system includes Trove, a database abstraction layer. Rather than applications connecting directly to a specific type of database, they connect to Trove, which in turn connects to one or more specific databases. One target database is Postgres Plus Cloud Database, which includes its own RESTful API. Trove was originally developed around MySQL, whose interfaces are significantly less complicated than those of the Postgres cloud database. In his session at 16th Cloud...
How does one bridge the gap between traditional enterprise storage infrastructures and the private, hybrid, and public cloud? In his session at 15th Cloud Expo, Dan Pollack, Chief Architect of Storage Operations at AOL Inc., examed the workload differences and required changes to reuse existing knowledge and components when building and using a cloud infrastructure. He also looked into the operational considerations, tool requirements, and behavioral changes required for private cloud storage s...
Software is eating the world. Companies that were not previously in the technology space now find themselves competing with Google and Amazon on speed of innovation. As the innovation cycle accelerates, companies must embrace rapid and constant change to both applications and their infrastructure, and find a way to deliver speed and agility of development without sacrificing reliability or efficiency of operations. In her Day 2 Keynote DevOps Summit, Victoria Livschitz, CEO of Qubell, discussed...
The speed of product development has increased massively in the past 10 years. At the same time our formal secure development and SDL methodologies have fallen behind. This forces product developers to choose between rapid release times and security. In his session at DevOps Summit, Michael Murray, Director of Cyber Security Consulting and Assessment at GE Healthcare, examined the problems and presented some solutions for moving security into the DevOps lifecycle to ensure that we get fast AND ...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In this session, James Kirkland, Red Hat's Chief Architect for the ...
In their general session at 16th Cloud Expo, Michael Piccininni, Global Account Manager – Cloud SP at EMC Corporation, and Mike Dietze, Regional Director at Windstream Hosted Solutions, will review next generation cloud services, including the Windstream-EMC Tier Storage solutions, and discuss how to increase efficiencies, improve service delivery and enhance corporate cloud solution development. Speaker Bios Michael Piccininni is Global Account Manager – Cloud SP at EMC Corporation. He has b...
While there are hundreds of public and private cloud hosting providers to choose from, not all clouds are created equal. If you’re seeking to host enterprise-level mission-critical applications, where Cloud Security is a primary concern, WHOA.com is setting new standards for cloud hosting, and has established itself as a major contender in the marketplace. We are constantly seeking ways to innovate and leverage state-of-the-art technologies. In his session at 16th Cloud Expo, Mike Rivera, Seni...
Hardware will never be more valuable than on the day it hits your loading dock. Each day new servers are not deployed to production the business is losing money. While Moore's Law is typically cited to explain the exponential density growth of chips, a critical consequence of this is rapid depreciation of servers. The hardware for clustered systems (e.g., Hadoop, OpenStack) tends to be significant capital expenses. In his session at Big Data Expo, Mason Katz, CTO and co-founder of StackIQ, disc...
There is no question that the cloud is where businesses want to host data. Until recently hypervisor virtualization was the most widely used method in cloud computing. Recently virtual containers have been gaining in popularity, and for good reason. In the debate between virtual machines and containers, the latter have been seen as the new kid on the block – and like other emerging technology have had some initial shortcomings. However, the container space has evolved drastically since coming on...
T-Mobile has been transforming the wireless industry with its “Uncarrier” initiatives. Today as T-Mobile’s IT organization works to transform itself in a like manner, technical foundations built over the last couple of years are now key to their drive for more Agile delivery practices. In his session at DevOps Summit, Martin Krienke, Sr Development Manager at T-Mobile, will discuss where they started their Continuous Delivery journey, where they are today, and where they are going in an effort ...
The 4th International Internet of @ThingsExpo, co-located with the 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - announces that its Call for Papers is open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
As the Internet of Things unfolds, mobile and wearable devices are blurring the line between physical and digital, integrating ever more closely with our interests, our routines, our daily lives. Contextual computing and smart, sensor-equipped spaces bring the potential to walk through a world that recognizes us and responds accordingly. We become continuous transmitters and receivers of data. In his session at @ThingsExpo, Andrew Bolwell, Director of Innovation for HP's Printing and Personal S...
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo, June 9-11, 2015, at the Javits Center in New York City. Learn what is going on, contribute to the discussions, and ensure that your enter...
SYS-CON Events announced today that BMC will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. BMC delivers software solutions that help IT transform digital enterprises for the ultimate competitive business advantage. BMC has worked with thousands of leading companies to create and deliver powerful IT management services. From mainframe to cloud to mobile, BMC pairs high-speed digital innovation with robust...
SYS-CON Events announced today that SUSE, a pioneer in open source software, will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. SUSE provides reliable, interoperable Linux, cloud infrastructure and storage solutions that give enterprises greater control and flexibility. More than 20 years of engineering excellence, exceptional service and an unrivaled partner ecosystem power the products and support that help ...
Enterprises are fast realizing the importance of integrating SaaS/Cloud applications, API and on-premises data and processes, to unleash hidden value. This webinar explores how managers can use a Microservice-centric approach to aggressively tackle the unexpected new integration challenges posed by proliferation of cloud, mobile, social and big data projects. Industry analyst and SOA expert Jason Bloomberg will strip away the hype from microservices, and clearly identify their advantages and d...
The multi-trillion economic opportunity around the "Internet of Things" (IoT) is emerging as the hottest topic for investors in 2015. As we connect the physical world with information technology, data from actions, processes and the environment can increase sales, improve efficiencies, automate daily activities and minimize risk. In his session at @ThingsExpo, Ed Maguire, Senior Analyst at CLSA Americas, will describe what is new and different about IoT, explore financial, technological and re...