Streamline Your Vulnerability Management with the
SAINT 8 Security Suite

Watch a quick demo of SAINT 8 scan set up Watch Video about SAINT 8 features White paper: The Next Generation of Security Asesssment SAINT 8 features sheet

Key features of SAINT 8 are highlighted below

Contact SAINT Sales


Multiple Scanner Deployments for enterprises Enterprise Functionality

Watch a quick demo of managing multiple scanners with SAINT 8 SAINT 8 features sheet

Multiple Scanner Deployments

Deploy multiple SAINT 8 scanners to support large enterprise environments or distributed scanning.

 

Faster Load Balanced Scans

Balance the work among nodes in a network for faster scanning.

 

Easy Scheduling

Schedule scans to run across multiple scanner nodes in a single job.

 


Friendly Integrated Interface

Friendly New Interface

Integrated Tools

Scan, exploit, report, view dashboards, and more, all from a single navigation bar. Navigate to other parts of the interface while a scan is running.

 

Friendly Interface

User interface based on function (compliance, vulnerability, etc.). Easy selection of scan targets with searches and sorts.

 

Dynamic Control of Data Presentation

Wide screen grid presentation allows fast queries, dynamic sorting, column selectors and multi-query filtering of data.

Scan Job Queue


""

Better Workflows Intuitive and Direct Workflows

Easy Scan Set-Up

Step-by-step wizard for creating a job; adding targets; setting target exclusions; setting and managing exclusions; configuring job-specific configurations, such as attack rules, timeout values, ports, email notification, etc.; scheduling immediate, scheduled or recurring scans.

 

Intuitive Workflow

Easy scanning workflow from discovery to target selection/exclusion, policy setup, customization and execution.

 

Easy Reporting

Step-by-step wizard for creating reports with over 150 configuration options. Merge the results from multiple scans into one report.

Easy Scan Set-up with The SAINT 8 Wizard

Scan Wizard Step One Scan Wizard Step 2 Scan Wizard Step 3 Scan Wizard Step 4 Scan Wizard Step 5 Scan Wizard Step 6

* Optional Step

SAINT 8 Scan Wizard makes Scan set up easy


Data Drill Down and Analysis

Custom Dashboards with dynamic drill down to results

Data drill down and analysis

 

Exploit Vulnerability, Exploit & Configuration Audit IntegrationSAINT8 exploits

 

Because the scanner is integrated with configuration assessments and exploit software, SAINT 8 gives you a holistic picture of your risk profile to help prioritize your remediation to the most critical exploitable vulnerabilities.

 

Centralized setup, execution, and control of –

  • exploit tools
  • vulnerability-specific exploits
  • penetration testing policies
 



NIST logo Dedicated SCAP Module

SAINT8 SCAP interface

 

SCAP scanning, analysis, and compliance reporting.

Policy editor to create custom policies based on NIST benchmarks.

 

 
 
 

 

 




Remediation Ticketing

Generate Workflow Tickets

Based on ticket policies and rules you define.

 

Easy Ticket Updates and Searches

Bulk update features for routine tasks like work assignment, ticket status, setting due dates and resolution information.

 

Keep History and Document

Retain a history of actions taken over time and document critical information about actions taken.

Remediation ticketing

Risk Management

In the past, customers relied on severity levels such as High, Medium, or Low to prioritize their battle against vulnerabilities. However, security experts and asset managers today require more advanced and flexible methods for correlating risks to their infrastructure and critical business functions, and devising mitigation strategies. Whether it is associating vulnerabilities with industry-specific severity codes like PCI’s Severity codes, standards compliance based on Pass/Fail, prioritizing risk based on numeric scores like CVSS, or basing priorities on whether a vulnerability is exploitable, the ultimate decision is up to you.

The value proposition from SAINT is to offer this flexibility and deliver easy-to-use solutions that facilitate the management of risk—not dictate how it should be conducted.

SAINT Scanner Sample Mapping


Scan Data


SAINT offers over 40 additional mappings to assist with prioritization, and to allow advanced users to map their own internal IDs or controls. More information on reporting.

Interoperability with 3rd Party Investments

While vulnerability management is a key component of any complete risk management strategy, security solutions must be capable of interoperability across the holistic security landscape. SAINT solutions provide feature-rich functionality to collect and analyze results within SAINT or within other security investments, such as advanced analytics platforms and GRC tools. Direct interoperability with other SAINT partner solutions includes the following:

  • Export content for manual integration with other products.

  • Use SAINT's REST API or Command Line Interface for executing product functionality or collect scan results for 3rd party integration.

  • Take advantage of SAINT's technical partnerships with integrators and technical product solutions such as GRC products for data integration and advanced analytics and reporting.

  • Combine the power of SAINT's scanning solution with Core Technology's Core Impact solution to support advanced penetration testing and threat management.

  • Leverage your security investments between IBM's QRadar SIEM platform and SAINT Security Suite by consuming SAINT scan results in IBM-compliant LEEF format.

  • For customers with the Cisco ecosystem, SAINT is an Cisco Solution Partner. Utilize SAINT's Cisco Partner solutions to interoperate with Cisco FireSIGHT Management Center (formerly Sourcefire) to facilitate Impact Flag correlation. See the white paper for more information. 

  • Extend your vulnerability management solution by quarantining high risk assets until vulnerabilities are remediated and verified. Connect SAINT Security Center to the Identify Service Engine (ISE) Management Center as part of Cisco's ecosystem and prevent high risk assets from communicating across your environment when high severity risks are discovered.  
    ( Discovery –> Analyze –> Prevent –> Mitigate -> Verify ). See the white paper for more information.

And Lots More ...

Dashboards

Custom Dashboards

  • Dynamic drill-down to results
  • User control of charts and graphs
  • Quick access to scan content

 

Analytics

Amazing Analytics

  • Assess risk directly reducing dependence on third party tools
  • Analyze multiple data set scan results
  • Sort, search and order content
  • Define results



Policy Customization

  • Create custom policies
  • Custom job-level scan configurations
  • Check policies, ports, exclusions

 

 

Asset Management & Access Controls

  • Create asset groups to manage collections of related scan targets
  • User and group level access controls
  • Target restrictions



API for Integration Support

  • Easy integration with third
    party applications and tools
  • Internal portal reporting and presentation

 

 

Scalability

  • SAINT 8 architecture enables scalability to meet our customer's changing needs.