Enhanced Cybersecurity with Cisco Secure Endpoint and Vulnerability Management

0
714

[ad_1]

Organizations as of late face the daunting problem of successfully prioritizing and responding to safety dangers and incidents. The mixture of Cisco Secure Endpoint and Cisco Vulnerability Management kind a robust automated resolution, enabling you to detect, prioritize and handle endpoint vulnerabilities, starting with probably the most extreme ones. There are two integrations obtainable to assist handle important points of safety, each pre- and post-incident, which not solely improve incident response, but in addition fortify preventative measures.

Post-Incident: Accelerated Response with Risk-Based Context

The first integration focuses on managing safety incidents post-occurrence with risk-based context. At the center of this integration is the Cisco Security Risk Score, powered by Cisco Vulnerability Management. It leverages the group’s endpoint information and telemetry, enriched with vulnerability menace intelligence, and is analyzed by means of superior information science algorithms like machine studying and predictive modeling. The consequence? A quantifiable, granular threat rating for each vulnerability, aiding in prioritizing and addressing probably the most important points instantly from the Secure Endpoint Console. The Cisco Security Risk Score is prominently displayed within the Secure Endpoint UI, offering scanner-less visibility into vulnerabilities in key working programs.

Users of Cisco Secure Endpoint Advantage or Premier will robotically achieve entry to the Cisco Security Risk Score for every CVE on managed endpoints; permitting them to leverage real-world menace intelligence as a part of their incident investigation. By integrating the Cisco Security Risk Score into the Secure Endpoint Console, SOC analysts will simply have the ability to determine the riskiest endpoints of their surroundings and drill down to know the vulnerabilities which can be driving that threat. Once the riskiest endpoints are recognized, you’ll have the ability to speed up your incident response by prioritizing motion on probably the most important vulnerabilities.

Figure 1: Viewing the Risk Score inside the Secure Endpoint UI
Figure 2: Viewing endpoint vulnerabilities within the Secure Endpoint UI

Pre-Incident: A Holistic Risk-Based Approach

Moving to a extra proactive stance, our new integration between Cisco Secure Endpoint and Cisco Vulnerability Management extends past a Security Operations use case to permit IT Operations and vulnerability administration analysts to achieve entry to a risk-based vulnerability administration platform. This integration permits customers of each options to detect endpoint vulnerabilities and prioritize these posing probably the most threat for environment friendly remediation. With Cisco Secure Endpoint, customers can hunt for hidden threats, detect stealthy malware, and carry out superior investigations with international menace intelligence from Cisco Talos. Cisco Vulnerability Management can then ingest the Cisco Secure Endpoint information, leveraging a devoted information connector, and prioritize the vulnerabilities based mostly on real-world attacker exercise and enterprise context. This permits organizations to considerably scale back their threat publicity with out growing their useful resource funding in remediation capability.

Figure 3: The Cisco Secure Endpoint connector choice proven within the Add Connector UI for Cisco Vulnerability Management

The integration of those two options permits customers to totally embrace a risk-based strategy to endpoint vulnerability administration. This integration unlocks a number of key use instances comparable to:

  • Detecting and understanding vulnerabilities on endpoints,
  • Centralizing vulnerability information from Cisco Secure Endpoint and different safety information sources by means of 50+ obtainable information connectors,
  • Prioritizing vulnerabilities based mostly on exploitation threat and asset context,
  • Implementing remediation workflows and enabling IT to self-serve to effectively scale back threat,
  • Measuring and reporting on threat posture, business benchmarks, and progress made.
  • Remediation Analytics & Scoring, Zero-Day intelligence powered by Cisco Talos, and Vulnerability Intelligence API and UI with the Cisco Vulnerability Management Premier tier

The integration of those two options takes vulnerability administration to a brand new stage, offering a complete, risk-based strategy to cybersecurity.

Figure 4: The Cisco Vulnerability Management UI displaying vulnerabilities

See It in Action

The integration of Cisco Secure Endpoint and Cisco Vulnerability Management is greater than only a resolution on paper – it’s a sensible, real-world software that may improve your cybersecurity measures. Don’t simply take our phrase for it, see it for your self. We’ve created a recorded demo showcasing the mixed energy of those two merchandise.

To be taught extra about how Cisco Vulnerability Management can improve your group’s cybersecurity efforts, go to https://www.cisco.com/site/us/en/products/security/vulnerability-management/index.html


We’d love to listen to what you assume. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social!

Cisco Security Social Channels

Instagram
Facebook
Twitter
LinkedIn

Share:

LEAVE A REPLY

Please enter your comment!
Please enter your name here