ZAIUX® Evo does not require the deployment of any Virtual Appliance or services to be installed on the endpoints. From the Cloud portal it will be possible to create and manage the Breach & Attack Simulation (BAS) and run it simply, by double clicking on a downloaded file, without any kind of administrative privilege.
No, ZAIUX® Evo has been designed to be used exclusively in Microsoft Active Directory environments, therefore, it cannot perform a Breach & Attack Simulation (BAS) in other environments.
Only Windows endpoints included in the domain are considered valid targets for scope of ZAIUX® Evo.
ZAIUX® Evo has been designed to be used in both Small Business and Enterprise environments; Therefore, there are no limits on the size of the target network.
The use of ZAIUX® Evo should not be taken as a substitute solution for existing Vulnerability Scanners. The different solutions should be used in a complementary way for a more accurate identification of all the real vulnerabilities in the network.
ZAIUX® Evo, unlike a normal Vulnerability Assessment, aims to identify all those vulnerabilities, misconfigurations and attack patterns that outruns the most of Vulnerability Scanners, which are designed for other purposes.
None. There is no need to create any exclusions or white-lists specific to ZAIUX® Evo, as the goal of the solution is to simulate a realistic attack in order to validate all defensive mechanisms implemented in the network.
It is possible, even through a VPN (Site-to-Site or Host-to-Site), but with the minimum requirement that the resolution of the names of the Hosts between the two parties is guaranteed.
For any information regarding the license model, refer to the licenses dedicated page.
ZAIUX® Evo is a full-cloud solution so you cannot use it without having an Internet connection on the target network.
Assistance
Are there more aspects to clarify? Contact us and we will answer all your questions.