Products

sRTMS = secured Real Time Matching Services

3 steps
  1. Connect to inventory data (e.g: Microsoft SCCM, ServiceNow Discovery, Amazon EC2 SSM, Splunk)
  2. Match to known vulnerabilities (CPE/CVE)
  3. Identify logical vulnerabilities
Steps


Why sRTMS?
  • Secure: Azure Policy
  • Fast: Real Time Services
  • Cost Effective: Monthly Subscription
  • Precise: cross check against existing patches (MS KB, Redhat)
  • Standard catalog: CPE from NIST/MITRE



Logical Vulnerabilities Identification

Logical Vulnerabilities Identification

Security Dashboard

ProductCVE


BigData @Work
Cloud Architecture