Deployment Options

Run anywhere, scan everything - your infrastructure, your way

Whether you need continuous network monitoring via Docker, one-time endpoint assessments, or scheduled compliance scans, TYCHON adapts to your operational requirements.

Three Ways to Deploy

🌐

Remote Mode

Network Infrastructure Discovery

  • Scan entire networks (CIDR/ranges)
  • Discover routers, switches, firewalls
  • IoT device cryptographic assessment
  • No endpoint agent required
  • Docker container deployment
Data Centers IoT Networks
💻

Local Mode

Endpoint Deep Discovery

  • Listening ports and connections
  • Memory scanning for crypto libraries
  • VPN clients and IPSec tunnels
  • Quantum readiness scoring
  • Run on-demand or scheduled
Endpoints Compliance
📁

Filesystem Mode

Data-at-Rest Cryptography

  • Certificate files (PEM, DER, P12, JKS)
  • Encrypted email archives
  • Private key discovery
  • Historical crypto tracking
  • Scheduled file server audits
File Servers Archives

Enterprise Headless Scanning

Deploy as Docker Container for Continuous Network Discovery

Perfect For:

  • Data center continuous monitoring
  • Cloud environment scanning (AWS/Azure/GCP)
  • OT/ICS network assessment
  • Multi-site distributed scanning
  • Kubernetes/Docker Swarm deployment

Key Benefits:

  • Scheduled scanning of network ranges
  • Automated discovery of new devices
  • Real-time streaming to SIEM
  • No GUI required - fully automated
  • Lightweight resource footprint

Quick Start Example:

docker run -d \
-e TYCHON_LICENSE_KEY="your-key" \
-e TARGET_NETWORK="10.0.0.0/8" \
-e ELASTIC_NODE="https://elastic:9200" \
tychon/quantum-crypto-manager:latest

Discover Hidden Assets in Your Network

Network Infrastructure

  • • Cisco routers & switches
  • • Palo Alto / Fortinet firewalls
  • • F5 / NetScaler load balancers
  • • VPN concentrators
  • • Wireless access points

IoT & Embedded Devices

  • • IP cameras and NVRs
  • • Building automation systems
  • • Industrial control systems
  • • Medical devices
  • • Smart building infrastructure

Legacy Systems

  • • End-of-life SSL/TLS
  • • Deprecated cipher suites
  • • Weak key lengths (RSA 1024)
  • • Export-grade cryptography
  • • Forgotten test systems

Real Example:

"One scan discovered 247 IoT devices with SSLv3 enabled that traditional vulnerability scanners missed. We had no idea these devices were even on our network."

Choose Your Scenario

Scenario 1: "I need to scan our data center"

→ Deploy remote scanner (container or binary)

→ Scan network ranges

→ Discover all infrastructure devices

→ Stream results to existing SIEM

Scenario 2: "I need to audit this workstation"

→ Run local mode scan

→ Find VPN clients, crypto libraries, certificate files

→ Get quantum readiness score

→ Generate compliance report

Scenario 3: "I need complete visibility"

→ Remote scanner for network infrastructure

→ Local agents/scans for endpoints

→ Combine results in single dashboard

→ Track everything over time

Scenario 4: "I need to audit file servers"

→ Enable filesystem scanning mode

→ Scan for certificate files and email archives

→ Discover hidden crypto material

→ Schedule regular compliance scans

Deploy in Minutes, Not Months

5 min

Install time

10 min

Time to first scan

$0

Consulting fees

0 days

Training required

Ready to Deploy?

Talk to our team about which deployment model fits your environment.