Vulnerability and asset management:
Preventing the preventable
Many security breaches result from missing or ineffective patching of
vulnerabilities on critical assets. These breaches don’t have to happen.
What does ‘good’ look like?
A good vulnerability and asset management program drives down business risk by remediating the vulnerabilities that could result in unacceptable harm. It bridges the gap between IT and business, enabling management to understand how technical vulnerabilities could jeopardize business outcomes. Essential to such a program are effective risk-based prioritization of vulnerabilities, efficient remediation processes and clear management reporting.
- Vulnerabilities that could compromise sensitive or critical information are identified quickly.
- Remedial action on vulnerabilities is prioritized by business risk.
- High risk vulnerabilities are processed within policy timescales.
- Management has assurance that vulnerability management is effective.
Datasheet
Vulnerability and asset management
As the digital landscape grows ever more complex with new technologies, devices and service providers, it is increasingly difficult to keep track of assets, vulnerabilities and patching status. There is an urgent need to prioritize open vulnerabilities based on the risks to the business. However, most patching programs don’t provide credible, timely information based on business risks that would make such prioritization possible. Learn how our Integrated Vulnerability and Asset Management application can help.
Processes and features
Automatically or manually link vulnerabilities to controls, incidents, test results, audits and other entities to enhance visibility of the risk landscape and improve decision making.
Capture the data
STREAM automatically captures vulnerability data from scanning tools, including scanned nodes and Common Vulnerability Scoring System (CVSS) score.
Associate with business processes
The data is associated with business impacts with each scanned node through data mapping.
Prioritize actions
Readily align the ISMS with the organizational structure and processes, using configurable workflows, webforms, data interfaces and reporting.
Remediate vulnerabilities
Automatically assign remediation actions, including priority-based scheduling and automated workflows with all the steps needed to close the vulnerability.
Validate effectiveness
Once remediation is complete, STREAM allows users to validate and check integrity, including changes to the baseline of scanned nodes.
Escalate continuing issues
Automatically escalate notifications to supervisor, if anomalies are detected (e.g., scanned nodes not responding to a scan or vulnerabilities persisting after a patching)
Report vulnerability status
On demand customized reporting on the status of vulnerability and asset management.
Contextualize to enhance decision-making
Automatically or manually link vulnerabilities to controls, incidents, test results, audits and other entities to enhance visibility of the risk landscape and improve decision making.