Vulnerability management systems, solutions and tools for cyber security

The vulnerability management system (Condor) provides the ability to understand the hardware and software vulnerabilities within your organisation’s NETWORK.

The Condor system delivers an in depth vulnerability assessment of the hardware and software running on your devices. We map devices against systems, and systems against your organisation’s risk assessment matrix to produce a network vulnerability baseline (NVB). This provides a comprehensive view of your assets, from a vulnerability, impact and associated risk perspective. The system then processes daily intelligence feeds from several industry leading sources against your NVB and alerts users of potential threats, the associated risks and recommended remediation activities.

Vulnerability Management

Learn More
Learn More
Learn More
Learn More
Alert Engine

Inventory to Alert Matching
The Condor system uses augmented client inventory data and matches this to the Alerts ingested from third party intelligence feeds to detect the location of vulnerabilities within client systems.

Vulnerability Investigation
Sapien’s analysts investigate vulnerabilities present in client systems, to determine how they work and if an exploit exists or has been exploited in the wild.

Risk Analysis
Condor Risk Analysis is an automated process, which takes into account a number of factors, including:

  • Whether the vulnerability is exploitable – by matching the connectivity available to the client systems with how the vulnerability works
  • Level of risk - whether impacted devices are in the critical systems identified in the risk model and if they are, what are the consequences of a successful exploit
  • The severity of the vulnerability – Based on its CVSS score and CVSS Vector

Learn More
Attack Surface Engine

NVD Matching
The Condor system matches CVE’s in the NVD database with augmented client inventory data to determine all vulnerabilities for every component in the client inventory.

Patch & Remediation Identification
Sapien Analysts maintain a current database of patches and remediations for all vulnerable components – these are security related patches only, not functionality related patches as operators will not patch for functionality as part of a vulnerability management program. Remediations are for devices which can’t be patched for operational reasons

Worst Case Vulnerability Determination
In some cases, components (such as earlier Microsoft operating systems) may have dozens if not hundreds of vulnerabilities. Sapien Analysts track and report the worst vulnerability for each component in client’s inventory so that operators can see at a glance how important it is to patch a particular component, regardless of how many vulnerabilities are present for that component.

Learn More
Break Plan Alerts

Break Plan alerts are generated for Sapien Condor clients based on the Risk Analysis and Vulnerability Investigation results. These Alerts include identification of all systems within the client facilities which are affected, an analysis of the nature of a potential exploit and a detailed list of affected devices, their physical locations and the risk of exploitation on a device-by-device basis. Clients can set thresholds on the seriousness of events for which they want a Break Plan alert to be generated. This enables clients to plan rapid and effective responses to critical vulnerabilities

Learn More
Attack Surface Reports

Attack Surface reports are a detailed picture of where all the vulnerabilities exist within a production facility. These reports detail:

  • All vulnerable devices on a per-system basis
  • what components on each Device are vulnerable.
  • The worst case vulnerability (CVSS) score and the CVE for each component
  • The recommended patch or mitigation for each component

3RD PARTY VULNERABILITY FEEDS

Learn More
3RD PARTY VULNERABILITY FEEDS

Condor ingests vulnerability intelligence feeds from a number of sources including ICS-CERT and USCERT and creates product specific Alerts based on this information. These Alerts are matched on a daily basis against all client inventories.

CLIENT CMDB & RISK DATA

Learn More
CLIENT CMDB AND RISK DATA

CMDB Data
- Condor ingests client CMDB information for Devices comprising hardware, operating system and software components for all types of equipment, including HMI’s, servers, PLC’s, switches and routers. It tracks this information against Device ID’s, Device Names and physical locations so that reporting can pinpoint the exact location of a vulnerability.

Risk Data
– Condor uses the IEC 62443 risk based vulnerability methodology of dividing OT facilities into functional Zones. Each Zone is a group of devices which has associated risk information used to quantify the risk to production associated with each vulnerability.

NVD DATABASE

Learn More
NVD DATABASE

The National Vulnerability Database (NVD) is the U.S. government repository of standards-based vulnerability management data (CVE’s). It is the most complete catalog of vulnerabilities available. Condor maintains a local copy of the NVD database which is used to determine the attack surface of a clients network by matching the NVD database to client inventory.

Learn More
Alert Engine

Inventory to Alert Matching
The Condor system uses augmented client inventory data and matches this to the Alerts ingested from third party intelligence feeds to detect the location of vulnerabilities within client systems.

Vulnerability Investigation
Sapien’s analysts investigate vulnerabilities present in client systems, to determine how they work and if an exploit exists or has been exploited in the wild.

Risk Analysis
Condor Risk Analysis is an automated process, which takes into account a number of factors, including:

  • Whether the vulnerability is exploitable – by matching the connectivity available to the client systems with how the vulnerability works
  • Level of risk - whether impacted devices are in the critical systems identified in the risk model and if they are, what are the consequences of a successful exploit
  • The severity of the vulnerability – Based on its CVSS score and CVSS Vector

Learn More
Attack Surface Engine

NVD Matching
The Condor system matches CVE’s in the NVD database with augmented client inventory data to determine all vulnerabilities for every component in the client inventory.

Patch & Remediation Identification
Sapien Analysts maintain a current database of patches and remediations for all vulnerable components – these are security related patches only, not functionality related patches as operators will not patch for functionality as part of a vulnerability management program. Remediations are for devices which can’t be patched for operational reasons

Worst Case Vulnerability Determination
In some cases, components (such as earlier Microsoft operating systems) may have dozens if not hundreds of vulnerabilities. Sapien Analysts track and report the worst vulnerability for each component in client’s inventory so that operators can see at a glance how important it is to patch a particular component, regardless of how many vulnerabilities are present for that component.

content-add-2-1
Learn More
BREAK PLAN ALERTS

Break Plan alerts are generated for Sapien Condor clients based on the Risk Analysis and Vulnerability Investigation results. These Alerts include identification of all systems within the client facilities which are affected, an analysis of the nature of a potential exploit and a detailed list of affected devices, their physical locations and the risk of exploitation on a device-by-device basis. Clients can set thresholds on the seriousness of events for which they want a Break Plan alert to be generated. This enables clients to plan rapid and effective responses to critical vulnerabilities

content-add-2-2
Learn More
Attack Surface Reports

Attack Surface reports are a detailed picture of where all the vulnerabilities exist within a production facility. These reports detail:

  • All vulnerable devices on a per-system basis
  • what components on each Device are vulnerable.
  • The worst case vulnerability (CVSS) score and the CVE for each component
  • The recommended patch or mitigation for each component

Data Sheet Image

Download Data Sheet