Import the catalog of all installed hardware and software items from all sites.
Import risk management database elements to quantify the likelihood and consequences of failures at each site.
The Vulnerability Engine assesses client data against intelligence feeds.
Identify and recommend the remediation activities for each device that presents with a susceptibility.
Enable the client with the most appropriate activity list for managing the overall exposure to risk.
Reduce the exposure to known vulnerabilities by proactively scanning data and recommending security patches.
The system automatically identifies security vulnerabilities and provides the recommended mitigation response base. Once patches have been installed the system verifies the patch has been applied.
Attack surface visualisation, real-time threat intelligence and attack vector analytics are utilized to determine the context of the vulnerabilities within their surrounding environment.
The system checks each managed asset against live threat intelligence feeds to determine the appropriate response based on criticality and business risk.
Full change management and change control processes are built into the system to meet the specific needs of the client.
Patches can be sent to an approver to review and approval prior to deployment. Approved patches can then be planned for implementation immediately or within the next change window.