Real-Time Software Vulnerability
Software Centric Solution
No network impact
“A Vulnerability Intelligence program should be a key component of any sound network security strategy. It should dovetail with a Vulnerability Assessment process and a patching/remediation process. While a Vulnerability Assessment process will tell you what needs to be patched, Vulnerability Intelligence should tell you what needs to be patched first and what new patches need to be evaluated.”
Scanned vs Logical Vulnerabilities
- fatstacks sRTMS associates CVE to inventory. call it logical vulnerabilities vs. scanned vulnerabilities.
- Scanning is technically challenging and expensive.
- Logical vulnerabilities have better coverage (agent).
- sRTMS found vulnerabilities missed by scanner and vice versa.
Scanned + Logical = Vulnerability Intelligence