Xiscan homepage Introduction > Xiscan in context
Products & Services | About Us | Contact | News | Resources | Clients | Site map | Home
Introduction
What is Xiscan?
Xiscan in context
Description
    Architecture
Features
Xiscan 6 - What's new!
Demonstration
  Configuration manager
Xiscan command line
Xiscan interactive
Xiscan report
Support



where Xiscan fits within a security framework

The only practical way to address security is by taking a holistic approach. This involves determining the risks and vulnerabilities of your entire system and designing a security architecture to suit. Part of the process involves adopting appropriate procedures and tools to support the architecture. Xiscan should therefore be viewed as contributing a part to the wider picture.

Xiscan addresses the vulnerability of dial in access with consummate ease.

Look through the security flow chart to see where Xiscan fits within your security architecture. Even if you don't think that Xiscan is applicable to your business, it's still worth following the flow chart.

You may be surprised.

Copyright © 2017 Xiscan Limited. All Rights Reserved.