The company claims that Nmap Scan Analysis will provide an easy-to-use visualization of Nmap scan data. Credit: ddukang / Getty Images Nmap is a popular and versatile tool for port scanning, network discovery, and security auditing, but its scan results can be complex to interpret. Vulnerability remediation platform maker Vicarius wants to change that. It began offering Wednesday a free tool—Nmap Scan Analysis—that security professionals, IT administrators and pentesters can use to get a comprehensive visualization of Nmap scan data.Nmap users can use the tool to import an XML file of their scan results into the company’s TOPIA dashboard, where the data is analyzed and subsequently displayed in a clear and visually coherent way that includes open ports, services, operating systems, and detected CVEs.“Our tool makes Nmap easier to work with,” Vicarius CEO Michael Assraf says in an interview. “It offers a visual alternative to an XML report or terminal output, which a lot of people have a hard time working with. Cybersecurity shouldn’t be so complex,” he adds. “It should be easy. It should be accessible. You shouldn’t need years of experience in pentesting and vulnerability assessment in order to figure out where you’re vulnerable.” VicariusNmap scan initiated from terminal with output before TOPIA analysis VicariusNmap scan initiated from terminal with output after TOPIA analysisInflux of new vulnerabilities Nmap Scan Analysis can help security professionals identify high-risk assets and understand where they are vulnerable. Devices that are typically not covered with traditional agent-based vulnerability assessment tools, such as printers and routers, can be key entry points for malicious actors. The tool illuminates those problem areas so system administrators can respond quickly. “With the constant influx of new vulnerabilities, it’s almost impossible to stay on top of our assessments and understand where we are vulnerable,” Charles Camello, head of infrastructure and cybersecurity at Soprano, a mobile messaging software company, said in a statement. Nmap Scan Analysis “augments our capability to identify vulnerabilities in internal and unmanaged assets. Before, we didn’t have this type of intelligence, insight, and analysis. This tool has significantly improved our security posture.”Assets on decentralized networks and work-from-home officesNmap Scan Analysis can also help network administrators simplify the newfound complexities of managing decentralized assets, remote environments, and IoT devices. “Decentralized networks and working-from-home have made it more difficult to gain a thorough understanding of the assets in a network,” Alejandro Zamarripa Treviño, an information security analyst with Farmacias Benavides, a Mexican drugstore chain, said in a statement. “With the rich Nmap visualization provided by Vicarius, we have eliminated the lack of coverage and feel more confident that we have our entire network under control.” The Vicarius tool also allows users to see the details of what has changed in their network from scan-to-scan. It stores all historical scans so security teams can reliably find, analyze, and resolve asset discrepancies in their network.Nmap scripts on GitHubVicarius is also making its Nmap scripts publicly available on its GitHub repository. Its engineers will push code updates and new features directly to the open-source project, so new enhancements will be available on a continual basis. With this community contribution, Nmap users can expect to receive better precision, dynamically updated CVE content, and daily CVE updates.“The results a customer will get—even if they are not running our scripts—will be more updated because they will have the most up to date CVE files,” says Assraf. “The Nmap community is good, and it’s nice that people are contributing, but with a commercial company contributing, things become much more professional.” Related content news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability brandpost The advantages and risks of large language models in the cloud Understanding the pros and cons of LLMs in the cloud is a step closer to optimized efficiency—but be mindful of security concerns along the way. By Daniel Prizmant, Senior Principal Researcher at Palo Alto Networks Oct 03, 2023 5 mins Cloud Security news Arm patches bugs in Mali GPUs that affect Android phones and Chromebooks The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma Oct 03, 2023 3 mins Android Security Vulnerabilities news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe