TECHNICAL ASSETS

Lightweight Agent for Endpoints

Our lightweight agent for endpoints helps you improve coverage and accuracy - not least when it comes to your remote workforce. Take your vulnerability management program to the next level with our agent.

LIGHTWEIGHT AGENT

Advantages with an Agent

As the boundaries of the traditional workplace, expand and organizations work remotely, many organizations lack visibility into mobile devices. We provide a lightweight agent for endpoints that comes with several comprehensive advantages - and will help you take control over your remote workforce.

green icon globe

Extended Coverage

Extend coverage to devices and systems that you can’t scan remotely.

green icon bullseye with arrow

Improve Accuracy

Improve software recognition accuracy without the need for authenticated scanning.

Green icon radar

Find More Vulnerabilities

Find vulnerabilities that traditional vulnerability management will not find.

green icon laptop and mobile

Cover Mobile Devices

Detect vulnerabilities in mobile devices in your remote workforce - wherever they are.

green icon fingerprint

Authentication-Less

Run without host credentials. Limit the need for authenticated remote scanning.

green icon cloud arrow down

Easily Implemented

Get started quickly with no maintenance needed. Automatic updates.

green icon light feather

Minimal Footprint

A lightweight agent with minimal performance impact.

TECH DETAILS

Agent Features

Our Device Agent supports a wide range of powerful features and functions for you to become successful.

  • Supports all recent Windows clients and server OS.
  • Distribute to devices using standard technology like Microsoft GPO (MSI).
  • No internet access is needed for agents – communication through a proxy connector.
  • Requires minimal host resources.
  • Unlimited scalability.
  • Automatic updates.
LIGHTWEIGHT AGENT

Agent Use Cases

Here are some of the use cases for our lightweight agent for endpoints - our Device Agent.

Get Started

green icon laptop and mobile

Remote Workers

Gain visibility and extend coverage into your mobile devices, including laptops.

green icon server

Critical Infrastructure

Gain insight into critical infrastructure that you don’t want to scan with traditional vulnerability management.

green icon network wired

Office Networks

Track devices with dynamic IPs over time.