SCN Solutions - Providing IT Your Way
Call: 215-820-6412
Vulnerabilities And Updates

Patch management for Microsoft, Mac OS X and Linux operating systems and applications.

Granular And Multiplatform

Prepare comprehensive inventory tracking reports and tracking asset changes, View configuration information, audit software and hardware changes and confirm al software and hardware assets.

Patch Management For OS’s

Patch management for Microsoft, Mac OS X and Linux operating systems and applications.

Monitoring Overview

Network and server monitoring identify when and where performance bottlenecks occur, with bandwidth and performance Monitoring History Reports. You can view and print 24-hour and seven-day history reports of bandwidth usage, or any Performance Monitoring parameter (such as processor utilization), directly from our monitoring system.

Access these reports at any time to proactively spot trends that could impact your network, or diagnose any performance issues that they have experienced.

With Asset Inventory Tracking you can produce informative and concise inventory reports showing all the hardware and software installed.

  • View configuration information
  • Prepare comprehensive inventory tracking reports and tracking asset changes
  • Track software license compliance
  • Audit software and hardware changes and confirm expected state is actual state

Daily systems check
A short report showing the results of the Daily Health Checks.

Weekly systems check / Monthly systems check
Schedule a weekly version, showing the results of the Daily Health Checks over the past week.

Key Capabilities

Patch Management
And Applications

Patch management is vital to your business. Small and medium based businesses face network security breaches most commonly because of missing network patches. Scans detect network vulnerabilities before they are exposed, reducing the time required to patch machines on your network. Our system patches Microsoft Windows desktops and servers, Mac® OS X®, Linux® and more than 50 third-party operating systems and applications, and deploys both security and non-security patches.

More than 50,000 vulnerability assessments are carried out across your networks, including virtual environments. We scan your operating systems, virtual environments and installed applications through vulnerability check databases such as OVAL and SANS Top 20. 

Vulnerability Audit Checks

During security audits, vulnerability assessments are conducted., you can perform multi-platform scans (e.g., Windows®, Mac OS®, Linux®; and iOS, Android™ and Windows phone devices that connect to the Exchange servers) across all environments, including virtual machines, and analyze your network’s security setup and status.

As well as running vulnerability checks on computers on your network, Our system also supports vulnerability scanning on a number of network devices such as printers, routers and switches from manufacturers like HP and Cisco.

Network auditing gives you a comprehensive view of your network: connected USB devices, smartphones and tablets; software that is installed; any open shares, open ports and weak passwords in use; and hardware information.

Monitor Server / Desktop
Critical Functions

Our Server Monitors maximizes your network availability by monitoring most aspects of your Windows and Linux servers, workstations and devices.

Linux users can monitor CPU usage, printer availability, file existence, processes running, folder size, file size, users and groups membership, disk partition check and disk space.

Once our system detects a failure, it sends alerts to us via SMS, email, or even a network message. You can configure specific time periods for you reports or as an alert so you are notified immediately. 

Asset Tracking And
Remote Management

Remote web monitoring offers systems a great deal of freedom, enabling us to quickly and effectively service our clients from anywhere in the world where you can use a browser. That reduces response times to system issues, enabling us to minimize down time in your organization.

Asset tracking gives you a comprehensive view of your network: smartphones and tablets; software that is installed; any open shares, open ports and hardware information. Our in-depth reports give you an important and real-time snapshot of your network’s status.

Automated network security audits scan, with the help of agents, across all client machines. The administrator simply needs to define the network perimeter and provide credentials to enable automatic network discovery, agent deployment and auditing of the client machines.