Specification
 
 
Features                    
Data Sheet                 
Specification          
Brochure                 
Trail Download
Technical Specification
Basic Features
Support advance NetBIOS password check list scan
Windows GUI user friendly interface, support Windows 2000 / 2003 / 2008 / XP/ Vista operating systems installation
Support network vulnerability scans on servers or workstations running Windows, UNIX, Linux and AIX operating systems
Fully integrated with English and Chinese interface, audit information and remediation suggestions
Support unlimited IP address and cross-domain scan
Customizable scan for host IP, IP range and check list input
Support scan on Web / Mail / FTP / File / Samba servers
Support scan on GatewayRouterSwitch
Offer Database (MSsqlMysqlOracleIBM DB2) vulnerability scan
Support password check on FTPPOP3HTTPNetBIOSIMAPSocksTelnetMSsqlMysql
Support inquiry function on ICMPTCPIPUDP Communication Protocols
Support HTTP ProxyMulti-Thread HTTP scan
Support TCP/UDP port and SNMP inquiry and other services running on network host machine
Provide remote auto-fix function for Registry or file permissions under AD authority
Detect HTTP PUT/DELETE and imitate penetration test on PUT behavior
Support WEB Site Directory Exploration scan
Support detection on SQL Injections to web service
Exclusive
Detection Technology
VH (Virtual Hacker)
FPP (False Positives Prevention)
AIT (Artificial intelligence Technology)
PSF (Protocol Signature Filter)
RAS (Remote Access Scanning)
HVS (Hardware Vulnerable Scanning)
RTS (Real Time Scanning)
DS (Dictionary Search)
Customizable
Functions
Customizable audit policy adjustment function
Customizable new audit policy function
Adjustable Thread、Ping Timeout and Data Timeout meter function
Password protect function, prevent program run by non-administrator account
Support customized schedule scan with auto save function
Support schedule scan report through E-Mail notification
Display / Hide customized tool bar and status
Provide statement modifying function for HTML output
Support customizable audit type and check type vulnerability scan setting
Provide audit scan result history curve illustrations
Provide project based auditing which target hosts by their network environment、department or importance
Support single scan on mass hosts and produce separate reports on certain IP groups
Support category statistical result : Cracked Account List、Host Account List、Host status List、Comparison Report
Support Real Time Display report with statistical result : Single host audit、Host lists、Risk analysis、Vulnerability analysis、Operating system analysis、Network services analysis
Support OBDC function, scanned data are retrievable in flexible use for future reference
Audit Result and Report Function
Vulnerability Audit Report-Provides Host Summary Map
Vulnerability Audit Report-Provides Top 6 most vulnerable hosts list
Vulnerability Audit Report-Provides operating system and network services list
Vulnerability Audit Report-Provides 20 network services list
Vulnerability Audit Report-Offers vulnerability types analysis
Vulnerability Audit Report-Offers risk level analysis
Vulnerability Audit Report-Offers network service types analysis
Vulnerability Audit Report-Offers individual IP vulnerability analysis
Vulnerability Audit Report-Provides Top 10 most vulnerable hosts list
Vulnerability Audit Report-Provides Top 10 vulnerability risk level list
Provide host and network gateway correlation in host’s audit result
Offer firewall suggestion on high risk level IP/Ports in host’s audit result
Defines CVEBugTraqX-ForceCVSS risk scores
Corresponding DNSDDragonSoft Network Security Databasein English / Chinese format
Provide diversified 3D graphical reports
Provide index quick link to vulnerability report
Provide project type comparison reports
Project type comparison report - Index quick link to vulnerability report
Project type comparison report - Index quick link to host PC vulnerability report
Project type comparison report - Vulnerability statistics in graphical format
Project type comparison report – Host PCs statistics in graphical format
Project type comparison report – Network services statistics in graphical format
Project type comparison report - Network servers statistics in graphical format
Project type comparison report – Provide display / hide button to show graphical format
Project type comparison report – Provide general vulnerability Trend Analysis
Project type comparison report – Provide high risk vulnerability Trend Analysis
Project type comparison report – Provide medium risk vulnerability Trend Analysis
Project type comparison report – Provide low risk vulnerability Trend Analysis           
Project type comparison report – Provide information risk Trend Analysis
Auto Update
Customizable scheduled auto update of scan module or database module on daily basis
Support patch download and vulnerability notice for English / Tradition Chinese / Simplified Chinese version by different specification
Support auto update function on all modules through Proxy server
Support Internet Security and Acceleration (ISA) service authentication
Provide main program / database manual update on official web site
Regulatory
Compliance
In compliance with BS7799 / ISO 270012005 , the information technology security management and its risk coefficients
Verified by CVE (Common Vulnerability and Exposure) Compatible Product & Data Base List
Evaluated by CVSS(Common Vulnerability Scoring System) as the standard of vulnerability assessment
Vulnerability assessment management complies with BS7799ISO / IEC-27001ISMSCNS-27001 standard
Audit policy complies with HIPAAHealth Insurance Portability and Accountability Actstandard

DVM Platinum
DVM Enterprise
DVM Professional

Version

   
Difference
Description
Unlimited
256
128
Scan hosts
The maximum capacity of target hosts per single scan task. The vulnerability audit supports single IP, IP range, IP list input to establish the scan hosts list
50
1
1
Scan schedule
The scheduling function enables automated scanning, saving and email notification without man operation.
The 50 scheduling supports audit scans under different domains, time, administrators
\/
X
X
Support DVM Center

DVM Center supports multi-endpoint, multi-domain, on-site random target, centralized vulnerability management platform. It remotely control, command, integrate, schedules, select policies, change target hosts, log report back and gather group reports from endpoint DVMs with flexibility

(This edition is available at additional cost or with other DVM packages)
\/
\/
X
Support ODBC
DVM follows open concept of DragonSoft Vulnerability Database management, all results are stored in ODBC directing to database simultaneously. Users are able to self-maintain or re-use the data with ease and flexibility

DVM Platinum
DVM Enterprise
DVM Professional

Version

   
Difference
Description
\/
\/
X
Comparison report

DVM not only limit to single audit analysis, but also provide project-based comparison reports, customizable by different project/section/department grouping. The multi-function analysis delivers effectively by time and remediation result factors. Comply with BS 7799 / ISO 27001 : 2005 risk management and reporting, the hosts and vulnerability are indexed and quick linked to following analysis:

  1. Total number of vulnerability
  2. Total number of scanned hosts
  3. Total number of network services
  4. Total number of web servers
  5. Trend analysis
  6. High level risk trend analysis
  7. Medium level risk trend analysis
  8. Low level risk trend analysis
Information risk trend analysis

Operating System Requirement:
Windows 2000、XP、2003 / IE 5.0 and above、FireFox 3.0 and above
Hardware Requirement:
Pentium 3 Celeron and above
Minimum 512MB memory(non-ECC) / 40G Hard Drive Space / CD ROM/DVD-ROM / Fast Ethernet Card / Wireless Network Card