F-Secure Radar
Harden your attack surface

Manage business-critical vulnerabilities
F-Secure Radar is a turnkey vulnerability scanning and management platform. It allows you to identify and manage both internal and external threats, report risks, and be compliant with current and future regulations (such as PCI and GDPR compliance). It gives you visibility into shadow IT - to map your full attack surface and respond to critical vulnerabilities associated with cyber threats.

Vulnerability scanning and management in a single solution
security-center
Keep on top of the current status of vulnerabilities and incidents, prepare standard and custom reports on risk and compliance, and more
Internet Asset Discovery
Enumerate possible attack vectors with an internet and web threat assessment
Discovery scans
Map your attack surface with network and port scanning
Vulnerability scans
Scan systems and web applications for publicly-known vulnerabilities
Vulnerability Management
Manage vulnerabilities centrally with security alerts and forensics
Discovery scans
Map your attack surface with network and port scanning
Assess vulnerabilities accurately
New assets and applications added to corporate networks internally – and to the global Internet via partners and service providers – entail new business-critical vulnerabilities that present an open door to cyber attackers. They call for heightened vigilance and compliance, yet firms still fail to take security seriously enough.

Information security managers need to be able to approach vulnerability assessment from several perspectives in order to get an accurate assessment of risks, minimize security threats, and maintain compliance. Properly executed vulnerability management improves your insight on your organization's security posture.
The best threat response is to predict and map your cyber security threats.
No other technology does that better than vulnerability management.
Identify and expose the possible threats
Unlike any other vulnerability management solution on the market today, F-Secure Radar features web crawling technology, called Internet Asset Discovery, that also covers the deep web. With this, you can fulfil a wide variety of tasks ranging from threat assessment to business intelligence. In other words, Radar allows you to easily browse through all targets to quickly identify risks and potentially vulnerable connections, and to expand the possible attack surface beyond your own network.

Successful intellectual property and brands often make companies the target for fraudulent or malicious activities. Such activities include brand violation where third parties pose as your company, phishing sites intended to scam or infect visitors, and typosquatting – where someone registers domains using words similar to your brand to redirect traffic using links that look like yours. Many companies have little to no awareness of these sorts of activities.
Radar vulnerability management
  • Comprehensive visibility
    Effective security mapping through precise discovery and mapping of all assets, systems, and applications on the network and beyond.
  • Streamlined productivity and security management
    No more inefficiency and missed security risks. Quickly address problems across multiple domains with an efficient service workflow, including vulnerability monitoring, automated scheduled scans, and ticketing for prioritized remediation and verification.
  • Reporting on risk
    Produce reports with credible information about your organization's security posture over time. Show and justify how IT security enables business continuity.
  • Reduced costs
    Vulnerability management is an opportunity to significantly lower the cost of security. It's less costly to deal with security before serious problems arise than it is to deal with it during a crisis or incident recovery. Additionally, leveraging Radar's cloud resources allows organizations to lower their expenses.
Details
Simple on the surface, supercharged under the hood
F-Secure Radar Security Center is your dashboard for all reporting, vulnerability management, and incident remediation. A high level of automation will help you to streamline your workflows, automate scans, and deliver detailed reports tailored to all your users. The Security Center is where you can control and assign, follow and manage all security issues in coordination with system administrators, software developers, testers, auditors, and your security team.

  • Centralized, uniform vulnerability reporting
  • Customizable reports in a variety of formats
  • Vulnerability management and ticketing
  • API interface for 3rd party integration (e.g. ServiceNow)
  • Capability of adding manually identified vulnerabilities
  • Scheduling of scans, and notifications when new hosts and vulnerabilities are detected

Map your attack surface
Identify assets for security vulnerabilities scanning and monitor network changes.

  • A fast, reliable, asynchronous port scanner
  • Fast host discovery mode for internal networks
  • Supports service and OS detection
  • Adjusts scan speed to suit network capacity

Identify known vulnerabilities
Identify security vulnerabilities associated with configuration errors, improper patch management, implementation oversights and more.

  • Identifies all known vulnerabilities
  • Scans any network device that talks IP
  • Supports Windows and Linux authenticated scanning
  • Delivers high accuracy, with low false positives and negatives
  • Stays up to date based on public vulnerability databases as well as vulnerabilities—including zero-day threats—discovered during F-Secure penetration testing

Test for web application vulnerabilities


  • Scan and detect security vulnerabilities within commercial and custom-built web applications. Test for numerous vulnerabilities, including the OWASP Top 10.
  • A web application scanner that can identify vulnerabilities within custom applications
  • Supports form-based authentication
  • Supports web application crawling
  • Supports assisted crawling and submission of forms
  • Scalable to allow a limitless number of web application scans

Discover external, vulnerable, or misconfigured systems


  • list.details.fr.internet-asset-1
  • list.details.fr.internet-asset-2
  • list.details.fr.internet-asset-3
  • list.details.fr.internet-asset-4

Ensure compliance with current and future regulations


  • list.details.fr.pci-compliance-1
  • list.details.fr.pci-compliance-2
  • list.details.fr.pci-compliance-3
  • list.details.fr.pci-compliance-4
  • list.details.fr.pci-compliance-5
  • list.details.fr.pci-compliance-6