Lightweight agent for endpoints

Our lightweight agent for endpoints helps you improve coverage and accuracy - not least when it comes to your remote workforce. Take your vulnerability management program to the next level with our agent.

LIGHTWEIGHT AGENT

Advantages with an agent

As the boundaries of the traditional workplace, expand and organizations work remotely, many organizations lack visibility into mobile devices. We provide a lightweight agent for endpoints that comes with several comprehensive advantages - and will help you take control over your remote workforce.

globe-duotone
Extended coverage

Extend coverage to devices and systems that you can’t scan remotely.

Icon-Bullseye-arrow
Improve accuracy

Improve software recognition accuracy without the need for authenticated scanning.

radar-duotone
Find more vulnerabilities

Find vulnerabilities that traditional vulnerability management will not find.

laptop-duotone
Cover mobile devices

Detect vulnerabilities in mobile devices in your remote workforce - wherever they are.

fingerprint-duotone
Authentication-less

Run without host credentials. Limit the need for authenticated remote scanning.

cloud-download-duotone
Easily implemented

Get started quickly with no maintenance needed. Automatic updates.

feather-duotone
Minimal footprint

A lightweight agent with minimal performance impact.

TECH DETAILS

Agent features

Our Device Agent supports a wide range of powerful features and functions for you to become successful.

  • Supports all recent Windows clients and server OS.
  • Mac and Linux support is coming in 2022.
  • Distribute to devices using common technology like Microsoft GPO (MSI).
  • No internet access is needed for agents – communication through a proxy connector.
  • Requires minimal host resources.
  • Unlimited scalability.
  • Automatic updates.

Agent use cases

Here are some of the use cases for our lightweight agent for endpoints - our Device Agent.

Get started with an agent

Remote workers

Gain visibility and extend coverage into your mobile devices, including laptops.

Critical infrastructure

Gain insight into critical infrastructure that you don’t want to scan with traditional vulnerability management.

Office networks

Track devices with dynamic IPs over time.