June 2019 | SC Media

Print Issue: June 2019

June 2019 Product Reviews – Vulnerability Management

This month, SC Labs revisited the vulnerability management space and reviewed a handful of solutions. Vulnerability management tools have become an important aspect of the security process. Through scanning an environment and penetration testing, they reveal where vulnerabilities exist and what could potentially be the results of their exploitation. Having one of these products in…

Skybox Security – Security Suite, Vulnerability and Threat Management

Skybox Security’s solution for Vulnerability and Threat Management provides organizations with an automated vulnerability management workflow encompassing comprehensive vulnerability discovery, assessment and prioritization, and remediation and tracking or oversight. It covers on-premises, cloud and OT networks. Using the context of network, assets, business, and threat intelligence, it accurately determines risk and focuses remediation on the…

SAINT – Security Suite 9.5

SAINT Security Suite 9.5 combines active vulnerability scanning, content scanning, web application scanning, mobile assessments, network device firmware assessments, configuration auditing, penetration testing, social-engineering and reporting into a single, fully integrated solution. It can scale from small to large deployments and supports a variety of integrations. It can be deployed through a software download, virtual…

Tripwire – IP360 9.0.3

Tripwire IP360 is an enterprise-class vulnerability management solution, managed via a web-based GUI that enables cost-effective risk reduction with remediation efforts focused on the highest risks and most critical assets. It provides comprehensive visibility into the enterprise network and all devices and associated operating systems, applications, and vulnerabilities. This single vulnerability management solution accommodates hybrid…

Tenable – Tenable.io

Tenable.io was designed to provide unified visibility and vulnerability prioritization insight to organizations to protect their environment through the monitoring of their entire attack surface with a single solution. It uses unique data collection approaches to provide this continuous visibility across all assets, managed or unmanaged, and supports compliance management. This solution has been engineered…

Kenna – Kenna Security Platform

Kenna Security Platform is a scalable, cloud-based solution designed to deliver informed and accurate risk prioritization and perform network/device vulnerability assessments, management and penetration testing. This solution offers hardware, software, virtual, SaaS or cloud-based deployment. It ingests, aggregates and processes tens of billions of pieces of data from multiple sources and automates that data analysis…

Digital Defense Frontline – Vulnerability Manager 6.2

Digital Defense’s Frontline Vulnerability Manager 6.2 intelligently and dynamically applies appropriate and relevant scan profiles to fingerprint assets within the scope of an assessment, enabling simple-to-configure, accurate and low abrasion assessments. The company recognizes that vulnerability management must include tools and features to report, prioritize and track vulnerability states to make it easy for users…

BeyondTrust – Enterprise Vulnerability Management

BeyondTrust Enterprise Vulnerability Management is a fully automated solution that uses a web-based interface and offers vulnerability and security configuration assessments by leveraging penetration testing results and exploit data. The penetration testing results are imported from Core Impact and Metasploit, while the exploit data comes from Exploit Database and CANVAS. Penetration testing can also be…

Next hm-product-review in Reviews