Vulnerability and asset management:
Preventing the preventable

Many security breaches result from missing or ineffective patching of
vulnerabilities on critical assets. These breaches don’t have to happen.

What does ‘good’ look like?

A good vulnerability and asset management program drives down business risk by remediating the vulnerabilities that could result in unacceptable harm. It bridges the gap between IT and business, enabling management to understand how technical vulnerabilities could jeopardize business outcomes. Essential to such a program are effective risk-based prioritization of vulnerabilities, efficient remediation processes and clear management reporting.

  • Vulnerabilities that could compromise sensitive or critical information are identified quickly.
  • Remedial action on vulnerabilities is prioritized by business risk.
  • High risk vulnerabilities are processed within policy timescales.
  • Management has assurance that vulnerability management is effective.

Datasheet

Vulnerability and asset management

As the digital landscape grows ever more complex with new technologies, devices and service providers, it is increasingly difficult to keep track of assets, vulnerabilities and patching status. There is an urgent need to prioritize open vulnerabilities based on the risks to the business. However, most patching programs don’t provide credible, timely information based on business risks that would make such prioritization possible. Learn how our Integrated Vulnerability and Asset Management application can help.

Processes and features

Automatically or manually link vulnerabilities to controls, incidents, test results, audits and other entities to enhance visibility of the risk landscape and improve decision making.

capture-the-data

Capture the data

STREAM automatically captures vulnerability data from scanning tools, including scanned nodes and Common Vulnerability Scoring System (CVSS) score.

associate-with-business-processes

Associate with business processes

The data is associated with business impacts with each scanned node through data mapping.

prioritize-your-responses

Prioritize actions

Readily align the ISMS with the organizational structure and processes, using configurable workflows, webforms, data interfaces and reporting.

remediate-vulnerabilities

Remediate vulnerabilities

Automatically assign remediation actions, including priority-based scheduling and automated workflows with all the steps needed to close the vulnerability.

validate-effectiveness

Validate effectiveness

Once remediation is complete, STREAM allows users to validate and check integrity, including changes to the baseline of scanned nodes.

escalate-continuing-issues

Escalate continuing issues

Automatically escalate notifications to supervisor, if anomalies are detected (e.g., scanned nodes not responding to a scan or vulnerabilities persisting after a patching)

generate-reports-on-demand

Report vulnerability status

On demand customized reporting on the status of vulnerability and asset management.

contextualize-to-enhance-decision-making

Contextualize to enhance decision-making

Automatically or manually link vulnerabilities to controls, incidents, test results, audits and other entities to enhance visibility of the risk landscape and improve decision making.