
1 minute read
Vulnerability manager
from Sunmap eBook Design
A. Vulnerability manager
Avoiding intrusion requires rapid and continuous assessment of IT assets weaknesses. Most vulnerability management tools are episodic and scans restart periodically, only after completion of the previous scans.
Advertisement
SunMap continuously and in real time detects all the vulnerabilities of the attack surface that an attacker might be able to view, providing you with your true risk exposure. It classifies vulnerabilities among several properties such as criticality, family, age, frequency, usage in real attacks, etc.
Regular vulnerability scanning will prompt you with a lot of near-useless alerts, while SunMap provides the flexibility to target the vulnerabilities that matter e.g.; if you want to scan only for critical vulnerabilities remotely exploitable, this is possible in one click.
Competitors
Choose a category, a scope and a periodicity. Large companies might have over 30 scanning plans, and therefore assets might be re-scanned 30 times without adding any benefits. This results in network perturbation, assets at risk and loss of time.
SunMap
Choose a category, scope and priority. For the following scan, the scheduler automatically adds the vulnerability to be scanned in the scope. We customize the scanning process to fit the needs of the clients, so for example, if two programs require a scan of the same asset at the same time, we will only scan it once.
B. Probes perspective
If an asset gets compromised, companies can lack visibility on the consequences from a security standpoint. What will the attacker see? What next steps might they take? What needs to be absolutely secured?
SunMap answers this question by installing different probes in the most strategic areas of your network.
Users can select the full picture view of their environments (assets and vulnerabilities), or focus on what the attacker sees from a specific area, and therefore understand what he is able to attack.
SUNMAP | 13