The eagerly anticipated Cisco Vulnerability Management (previously Kenna.VM) integration with Cisco Secure Endpoint is formally obtainable! As of right now, vulnerability evaluation could be performed with Cisco Secure Endpoint and ingested into Cisco Vulnerability Management for evaluation, prioritization, and administration.
Our group builds plenty of integrations (we have now 55+ native integrations) however this one certain will get us excited. This integration opens the door to new alternatives for Cisco Secure Endpoint clients, Cisco Vulnerability Management clients, and prospects of each options. Generally, it’s a boon for any safety group in search of a approach to transfer their vulnerability administration program to a risk-based method.
What does this integration do?
As a Cisco Vulnerability Management and Cisco Secure Endpoint buyer, you’ll do the preliminary integration arrange, schedule your integration runs, and you then’re off. Asset and vulnerability knowledge from Cisco Secure Endpoint will probably be ingested immediately into Cisco Vulnerability Management, the place you will notice commonplace vulnerability info—our Risk Scoring, descriptions and traits, repair info, and far more.
What is the profit for me, the client?
In a nutshell, this integration enables you to activate risk-based vulnerability administration. If you’re a Secure Endpoint buyer, chances are you’ll know that a few of Cisco Vulnerability Management’s vulnerability intelligence is already seen in Secure Endpoint. Right now, this intelligence provides a glimpse into what Cisco Vulnerability Management can do.
Cisco Vulnerability Management is a platform designed for risk-based vulnerability administration. Not solely are you able to herald Cisco Secure Endpoint knowledge, however you may as well join any further vulnerability knowledge sources in your surroundings (like a community vulnerability scanner). All of this knowledge is centralized in a single view and obtainable so that you can handle by way of Risk Meters (or asset teams that meet particular standards). And in fact, in Cisco Vulnerability Management, our threat scoring is entrance and middle—you’ll see scoring for vulnerabilities, property, Risk Meters, and the group as a complete.
Why does threat scoring matter?
Ultimately, the danger scoring your group leverages determines what you remediate and when. This impacts each your total threat posture, in addition to the effectivity of your sources. Cisco Vulnerability Management makes use of knowledge science to investigate each your inside safety knowledge in addition to a wealth of exterior exploit and risk intelligence to grasp the true threat profile of vulnerabilities inside your surroundings. The ensuing scores in the end assist clients and prioritize the that pose an actual threat (these which are each noticed in enterprises and exploited within the wild).
Our scoring, on each stage, provides safety and IT groups a measurement backed by proof and supported by an array of purpose-built options to assist streamline the remediation course of, together with repair suggestions, ticketing integrations, and reporting. And in case you’re a safety practitioner trying to take the subsequent step and level-up vulnerability administration, it is a pure and simple subsequent addition to your Cisco Secure expertise suite.
Endpoint safety and vulnerability administration – a unified final result
If you’re conversant in Cisco Vulnerability Management, chances are you’ll know that this isn’t our first integration with an endpoint safety device—however we do really feel it’s essentially the most thrilling one. With vulnerabilities proliferating inside endpoints, it’s crucial for safety groups to remain on high of vulnerability threat rising by way of this vector. Vulnerability administration has turn into an endpoint safety necessity, a lot in order that endpoint safety distributors are more and more incorporating vulnerability prioritization and administration capabilities we’d normally solely see in conventional vulnerability administration options. And for many of these distributors, the vulnerability administration story stops there. But not for Cisco Secure.
Cisco Secure now provides clients a transparent line of sight from their endpoints to the danger postures, together with the means to evaluate, prioritize, handle, and orchestrate remediation. And whether or not you’re a Cisco Secure Endpoint buyer trying to advance your vulnerability administration, or a Cisco Vulnerability Management buyer with an lively curiosity in endpoint safety, this new integration paves the best way to the perfect vacation spot: a state of extra environment friendly, optimized threat administration.
The Cisco Vulnerability Management integration with Secure Endpoint is accessible right now. Customers of the Cisco Secure Endpoint Advantage or Premier tiers are eligible for the combination, in addition to some Essentials clients.
Interested in studying extra? Request a demo or your gross sales consultant to debate how Cisco Secure can meet your safety wants.
We’d love to listen to what you assume. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social!
Cisco Secure Social Channels
Instagram
Facebook
Twitter
LinkedIn
Share: