img-shield

FAQs

What main problems does XRATOR solve?
XRATOR enables CISO, CRiskO or anyone in charge of the security of an IT infrastructure to manage its cyber risk. You will be able to discover the vulnerabilities of your internal network without any installation, track the progress of fixes per assets and capitalize the remediation steps. XRATOR will daily alert of new vulnerabilities affecting your assets. Our automated rating assessment based on our expertise and public information will help you to decide which vulnerabilities to fix in priority.
What do I need to install to use XRATOR?
Nothing ! Xrator enables you to scan your internal network without deploying a new server or installing anything on your premise. Xrator provides a portable application that connects to our scanners when it runs. You only need to allow UDP outbound traffic. All manageable via the dedicated web interface.
Will XRATOR create a security breach on my network?
Xrator will create a dedicated and isolated container for each scan which will be destroyed when the scan is complete. The communication between our portable application and our servers is using state-of-the-art cryptographic standards. Plus you have full control over the portable application.
How does XRATOR help me enhance my productivity?
XRATOR provides a custom risk analysis based on industry standards and the information coming from your own infrastructure. It provides a knowledge database of technical articles and specific remediation steps for each type of well-known Operating System/Application. You will assign to your engineers their network portion to be remediated and easily track what has been done to build your own personal knowledge database.