Products

sRTMS = secured Real Time Matching Services

3 steps

  1. Connect to inventory data (e.g: Microsoft SCCM, ServiceNow Discovery, Amazon EC2 SSM, Splunk)
  2. Match to known vulnerabilities (CPE/CVE)
  3. Identify logical vulnerabilities
Steps

Why sRTMS?

  • Secure: Azure Policy
  • Fast: Real Time Services
  • Cost Effective: Monthly Subscription
  • Precise: cross check against existing patches (MS KB, Redhat)
  • Standard catalog: CPE from NIST/MITRE

Logical Vulnerabilities Identification

Logical Vulnerabilities Identification

Security Dashboard

ProductCVE

BigData @Work

Cloud Architecture