Our IT and Email management platforms GFI OneGuard and GFI OneConnect have now been launched. Find out more

Network Security Insights - GFI LanGuard

Extract critical information about the security status of your network using GFI LanGuard reports. A network is as vulnerable as its weakest point: use GFI LanGuard reports to discover all devices from your network, vulnerability status, patching status, open ports, open shares, unused services and users, unauthorized applications and other security sensitive information.

The reports can be:

  • issued on demand or scheduled and sent to your inbox on a regular basis
  • customized to show/hide report items, apply custom filters, change grouping and sorting.
Divider

Computers with AV disabled?

When antivirus protection is not working on a system the entire network might be in great danger. Find out when the antivirus is not installed or disabled on a system using "Antivirus Audit" report.

Download a sample report

Divider

Prove you are compliant

All IT security related compliance regulations require regular vulnerability assessments of the network and all systems and applications to be fully patched. GFI LanGuard helps with that and comes with dedicated reports that allow you to prove you are compliant with an important number of regulations and standards, such as PCI DSS, HIPAA, SOX, GLBA, PSN Coco, FERPA, CIPA, ISO/IEC 27001 & 27002, FISMA, CAG and NERC CIP.

Download a sample report

Divider

Unused accounts?

Unused user accounts can accumulate in time leading not only to cluttered user management, but also adding security holes as old accounts can be used as an entry point in your network. It is recommended to remove or disable accounts that are no longer used. Investigate them using "Groups and Users" report.

Download a sample report

Divider

What systems have outdated hardware?

Computers with outdated hardware can generate productivity issues because they are slow and security issues because they might not fit system requirements of the latest updates for operating systems and third party applications. Find about them using "Hardware Audit" report.

Download a sample report

Divider

What mobile devices connect to your network?

Using "Mobile Devices" report you can find out what users, how often and using what smartphones and tablets connect to the company infrastructure to check email. Microsoft Exchange, Office 365, Google Apps and Apple Profiles Manager are supported.

Download a sample report

Divider

What changed in your network?

To know what really happens in your network use "Network Security History" report. You will learn about applications installed or removed, services started or stopped, ports newly open, user accounts created, modified or removed, new open shares, hardware changes and so on.

Download a sample report

Divider

Complete network security overview

Get an executive overview of your network security: overall vulnerability status, most vulnerable computers, vulnerability trends, statistics on how many computers have vulnerabilities, missing patches, unauthorized applications, antivirus or firewall turned off and so on.

Download a sample report

Divider

What new devices are added to the network?

Devices you are not aware of cannot be managed and may represent a huge security hole. Get notified about forgotten or new devices in your network using "New Devices" report. You will learn about new servers, workstations or laptops, new virtual machines, new network devices such as access points, routers, switchers or printers and new mobile devices such as smartphones and tablets.

Download a sample report

Divider

What ports are opened in the network?

Open ports are gates that allow remote access to your systems. Investigation of any suspicion open port should be a high priority task for all system administrators. Monitor them using "Open Ports" report and make sure that only necessarily TCP and UDP ports are open.

Download a sample report

Divider

What is shared in the network?

Auditing of what is shared in the network reveals pretty often unpleasant surprises from a security point of view. "Open shares" report shows what is shared in the network and who has permissions to access those shares. Pay special attention to shares that are accessible to everyone.

Download a sample report

Divider

Are your systems fully patched?

Ensure that your systems are always up to date. The majority of security breaches are caused by a vulnerability for which there is a patch that was not applied. "Patching Status" report provides complete visibility into the network patching status, covering operating system and most popular third party applications across Windows, Apple OS X, Red Hat Linux Enterprise, CentOS, Fedora, Ubuntu, Debian, SUSE and openSUSE systems.

Download a sample report

Search for specific keywords

Looking for specific keywords within the scan results of the entire network? Use the full text search functionality for this. For example, a search for "ACCOUNT_DISABLED" will reveal all disabled users across the network. A search for "cross-site scripting" will list all vulnerabilities detected in the network that contain "cross-site scripting" in name or description.

Download a sample report

Divider

What services run on your computers?

Among the best security practices is to audit and close unnecessary services to reduce the attack surface for your systems. "Services" report is the right tool to achieve this.

Download a sample report

Divider

What applications are installed in the network?

Third party applications are a major source of security vulnerabilities. Find out what applications are installed in your network using "Software Audit" report. Check how many instances of a specific application are present in your network to verify license usage.

Download a sample report

Divider

Unauthorized applications?

Applications such as games or peer-to-peer software can spread spyware and other mallware in the systems or lead to employees wasting time. "Unauthorized Applications" report lists all unwanted applications installed across the network.

Download a sample report

Divider

What USB devices connect to your network?

USB devices are a common way to steal sensitive company data or to introduce mallware in the network. Verify what USB devices connect to your network using the "USB Devices" report.

Download a sample report

Divider

How vulnerable is your network?

Find about the security issues in your network before it is too late. "Vulnerability Status" lists all security vulnerabilities detected in the network. Use it to see where critical issues are and to check vulnerability status for each machine: workstations, servers and laptops, physical and virtual machines, network devices such as routers, printers, switches and access points or mobile devices such as smartphones and tablets.

Download a sample report

Divider