May 2020 | SC Media

Print Issue: May 2020

First Look: ReversingLabs Titanium Platform

Company Name: ReversingLabsProduct Name: Titanium PlatformBasic Price: Starting price is $10,000 for threat intelligence integrations and web offerings with volume-based pricing for large scale deployments.What it does: A machine learning hybrid cloud platform that harvests thousands of file types at scale to minimize threat detection lead time.What we liked: Detailed threat analysis of network traffic…

First Look: Guardicore Infection Monkey version: 1.7

Company name: GuardicoreProduct name: Infection Monkey version: 1.7Email: [email protected]: https://www.guardicore.com/Basic Price: Free, Open SourceCustomer Support Offerings:  For questions, suggestions and guidance join the Infection Monkey​ community via the Slack channel https://infectionmonkey.slack.com/​.  Guardicore Infection Monkey source code is available for direct download at the ​GitHub​ repository https://github.com/guardicore/monkey. During past year there have been a flood of…

Vulnerability management

A well-run vulnerability management program removes the guesswork, says Katelyn Dunn. his month, we revisited a mixture of familiar and new faces. Vulnerability management is such a basic security element that occasionally it gets overlooked. However, these tools should be a staple in every security arsenal by now. In some cases, organizations may deploy more…

Beyond Security beSECURE 20.3

Beyond Security beSECURE is a flexible, low-maintenance vulnerability management solution that continuously scans for vulnerabilities. This tool is simple and flexible to facilitate risk discussions between security teams and C-level managers. This platform does not just ingest data, but also comes with both external and internal scanners. Users can choose from numerous pre-configured scans and…

Carson & SAINT SAINT Security Suite 9.7

Carson & SAINT has designed SAINT Security Suite to help security teams easily manage their data. With the SAINT Security Suite, companies now view vunerability management as a business problem and use professional services such as compliance support, gap assessments and others to address it. This single, fully integrated solution conducts active, passive and agent-based…

Digital Defense Frontline Vulnerability Manager

Digital Defense Frontline Vulnerability Manager performs automated vulnerability assessments with a patented scanning engine that enables simple configuration of the assessments to gain visibility into the weaknesses of network assets. It provides the tools and features to report, prioritize and track vulnerability states. This cloud-native, SaaS platform integrates with many cybersecurity leaders to enhance existing…

Kenna Security Kenna.VM

Kenna Security Kenna.VM is a modern, cloud-based SaaS vulnerability management solution that ingests, aggregates and processes heaps of data from several sources. It then automates data analysis with a patented algorithm that delivers accurate and quantifiable risk scores for all vulnerabilities within an environment. Most vulnerability management solutions attempt to remediate everything on an environment,…

NopSec Unified VRM 5

NopSec Unified VRM, a SaaS-based solution, utilizes machine learning to develop better means of prioritizing vulnerabilities and then mitigating them across their lifecycles. This approach reduces alert fatigue and helps security teams cut through data overload quickly so that they can discover actionable information about business-contextualized threats. The faster analysts can gain visibility into a…

Rapid7 InsightVM 6.6.1

  Rapid7 InsightVM uses scan engines, agents and integrations to analyze asset data and assess vulnerabilities according to policies, compliance standards and configurations. Each of these features provides visibility and support for risk assessment, prioritization and remediation. This vulnerability management solution aims to bolster the security posture of modern environments and prove the efficacy of…

RiskIQ Digital Footprint

RiskIQ Digital Footprint uses a unique mixture of web crawling and port scanning to discover digital assets then analyze them for vulnerabilities. This approach extends vulnerability control outside of the firewall to find and eliminate JavaScript threats and secure cloud expansion. Digital Footprint discovers unknown pages and IP addresses to visualize exposures in real time,…

Next hm-product-review in Reviews