SC Awards

Finalists: Best Vulnerability Management Solution

Where are the gaps in your network? How might bad actors slip in? The answer to those questions evolves just as quickly as the nature of the threats.

The technologies recognized in this category perform network/device vulnerability assessment and/or penetration testing, using such tactics as active or passive testing and either hardware- or software-based solutions to help companies recognize and ultimately mitigate threats to their most valuable assets.

FINALIST | BEST VULNERABILITY MANAGEMENT SOLUTION

BREACHCONTROL
Company: Balbix
Noteworthy: Leverages specialized AI to automatically analyze enterprise networks and provide real-time visibility of breach risk, prioritizing vulnerabilities based on business risk and performing continuous monitoring and analysis across the attack surface.

FINALIST | BEST VULNERABILITY MANAGEMENT SOLUTION

INSIGHTVM
Company: Rapid7
Noteworthy: Equips customers with capabilities like attack surface monitoring with Project Sonar, integrated threat feeds informed by Project Heisenberg honeypots, and proprietary risk scoring informed by Metasploit.

FINALIST | BEST VULNERABILITY MANAGEMENT SOLUTION

SKYBOX VULNERABILITY AND THREAT MANAGEMENT
Company: Skybox Security
Noteworthy: Utilizes 3D modeling to identify exposed vulnerabilities via attack simulations on the model to prioritize an organization's unique risk.

FINALIST | BEST VULNERABILITY MANAGEMENT SOLUTION

SYNERCOMM'S CONTINUOUS PENTEST AND VULNERABILITY ASSESSMENT
Company: SynerComm
Noteworthy: Powered by Synercomm's CASM Engine, pentesters perform monthly playbooks and respond to alerts from the CASM Engine, a fully automated platform that continually discovers, collects and normalizes attack surface and vulnerability data.

FINALIST | BEST VULNERABILITY MANAGEMENT SOLUTION

VULCAN VULNERABILITY REMEDIATION ORCHESTRATION
Company: Vulcan Cyber
Noteworthy: Platform acts as “remediation middleware” that orchestrates the tools used to address isolated steps in a company’s vulnerability remediation process, and leverages the data siloed across those tools to automate remediation outcomes.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.