Download Contact Sales
Security & Privacy

Security isn't a feature we added. It's how MCS was built.

MCS was designed from the outset to deliver a secure network testing platform, out of the box, with no reliance on external web servers, no public database APIs, and solid-state hardware that has no operating system to compromise.

The Approach

Whitelist-only. No Apache. No IIS. No attack surface inherited from third-party software.

Most web-hosted applications rely on commercial web servers like Apache or IIS. Every vulnerability in those platforms becomes your vulnerability. MCS eliminates this dependency entirely by running its own built-in web server with a custom Web Application Firewall.

The MCS WAF uses a whitelist-only approval process. Instead of trying to block known threats (and missing new ones), MCS only allows explicitly approved requests. Everything else is rejected and audited. This inverts the traditional security model and is far more resilient to emerging and zero-day threats.

Whitelist-only WAF: Only explicitly approved request patterns are accepted. Unknown or malformed requests are rejected and logged.
No external web server: MCS runs its own web engine. No Apache, IIS, or Nginx. No inherited CVEs from third-party server software.
Extensible ACL engine: IP and subnet-based access control restricts administrative access. Policy rules adapt to your security requirements.
Built-In Protections

OWASP Top 10 coverage, out of the box

The MCS WAF provides built-in protection against common web application attack vectors. No additional security software or configuration required.

Cross-Site Scripting (XSS)

Whitelist validation prevents injection of malicious scripts through request parameters or input fields.

Cross-Site Request Forgery (CSRF)

Request validation ensures actions originate from legitimate sessions within the MCS framework.

Code Injection

No server-side scripting engine (PHP, ASP, etc.) to exploit. MCS does not execute user-supplied code in any form.

Path Traversal

Recursive file syntax exploits (../../ attacks) are blocked. The whitelist only permits known, valid URL patterns.

Fraudulent URLs

URLs that don't match the whitelist policy are rejected immediately. No file discovery, no directory enumeration.

Binary Execution

MCS does not allow uploading or execution of binary files through the web interface. The attack vector simply does not exist.

Satellite Security

Hardware with no OS. Software with no persistent data. Nothing to compromise.

NCS satellites are designed as secure points-of-presence that can be deployed in public networks, customer environments, and untrusted locations without introducing risk.

Hardware Satellites

Solid-state appliances with no operating system, no file system, and no executables. They cannot be infected with malware, cannot be used as a pivot point, and cannot be compromised through OS-level vulnerabilities. Safe for deployment in any environment.

Software Satellites

Operate without underlying file system access for minimal data threat exposure. No persistent test data is stored on the host. Software satellites restrict access to OS data assets and communicate only with your MCS server. While file penetration risks are mitigated, the security of the host OS itself remains the responsibility of the platform administrator.

Stateless by Design

NCS I-points and E-points do not store or maintain any persistent data. All test results flow exclusively to the MCS management server. There is nothing on a satellite device to exfiltrate, encrypt, or hold ransom.

Data Privacy

Don't collect sensitive data. Store only what's needed. Keep it on your server.

The MCS approach to data privacy starts with a simple principle: don't collect data you don't need. MCS measures network performance metrics. It does not inspect packet contents, capture user data, or store sensitive information.

  • All test results stored in a proprietary database on your MCS server, under your control
  • No public API for direct database access, protecting data integrity
  • No data is sent to Visualware or any third-party cloud service
  • NCS satellites store no persistent data of any kind
  • Extensive penetration testing for all Release Candidate and General Availability builds
  • Compliant with environments subject to HIPAA, PCI-DSS, and GDPR requirements
Your infrastructure, your data. MCS runs entirely on your server. Nothing leaves your environment. No cloud processing, no telemetry, no phone-home.
Penetration tested. Every RC and GA release undergoes penetration testing. Risk mitigation procedures are documented and maintained.
Minimal data collection. MCS measures network metrics. It does not inspect, capture, or store packet contents, user credentials, or personally identifiable information.
Security & Cost

Fewer dependencies. Fewer vulnerabilities. Lower operational cost.

By eliminating external web servers, commercial OS requirements on hardware satellites, and persistent data on endpoints, MCS reduces both the attack surface and the cost of maintaining it.

No OS Patching on Hardware

Solid-state satellites have no operating system. No Windows updates, no Linux kernel patches, no zero-day exposure. They just run.

No Web Server Maintenance

No Apache, IIS, or Nginx to configure, harden, or keep current. The built-in web engine is maintained as part of MCS itself.

Safe in Customer Environments

Deploy hardware satellites in customer private networks with confidence. No OS to compromise, no data at rest, no risk to the host environment.

Adapts to Emerging Threats

The whitelist-based WAF framework enables rapid adaptation to new attack patterns. The extensible policy engine updates with each MCS release.

Learn More

See how MCS security works in practice

Book a demo to walk through the security architecture, or download a free trial and review it in your own environment.