Correlate results from multiple security scans into a single view and map them to the relevant controls
Collect the diverse range of data you need for continuous monitoring
Reduces the time needed to analyze and confirm finding across hundreds of assets
Utilize trending reports for greater understanding of how findings have changed over time
Increase analysts’ effectiveness in understanding extensive security results
Standardize your security approach and methodology by using centralized repositories of mappings to controls
Adaptive Mapping™: The Key to Continuous Compliance.
With Adaptive Mapping, security testers and assessors can look across multiple security feeds and understand how they influence a variety of controls and requirements for a particular product or system.
Cascading Analytics: Analyze Many Assets with Less Effort.
Cascading Analytics is revolutionary in its approach to increasing productivity while decreasing analysis efforts on the part of the user. Analyze just a few assets and let Cascading Analytics apply that analysis to the rest.
Xacta HostInfo: Gather the information needed for security assurance.
This family of platform-specific executables collects and provides security-relevant configuration information to the Xacta Detect server for assessment. Xacta HostInfo also supports NIST SCAP-validated testing capabilities to determine compliance with FDCC and other XCCDF checklists.
Xacta Continuum™: Automate key tasks in continuous monitoring for a single integrated view of your security compliance posture.
Now there’s a solution for taking control of your ever-changing security compliance landscape. Xacta Continuum™ correlates scan results from multiple security products across your organization into a single view, and maps them to the relevant controls for security and risk management, such as NIST 800-53, CNSS 1253, DoDi 8500.2, ISO, and others. You can then use these results to create reports for analysis and to understand trending security issues in their environment.
Xacta Continuum gives you:
Xacta Continuum is 100% SCAP compliant and accepts configuration and vulnerability data captured from a long list of security tools that assess hosts, application servers, databases, and source code. Our flexible but powerful plug-in development interface allows you to create plug-ins to support any third party scanning tool. Configuration and vulnerability data that can’t be automatically captured can be easily collected using the Xacta Assessment Engine.