Vulnerability management is a security practice specifically designed to proactively mitigate and prevent the use of IT vulnerabilities in the system. The process includes the identification, classification and removal of various system vulnerabilities. It is an integral part of computer and network security along with risk management and other security practices.
Emerging Threats Intelligence
Proofpoint Emerging Threats Intelligence (PETI) provides the most current and accurate threat intelligence. Expert-verified information provides deeper context and integrates with security tools to improve decision making. In addition to reputation information, you get deep context, history and detection information. All of this is searchable in an easy-to-use threat analysis portal that includes:
- Trends and time signatures, when the threat was spotted and the associated category
- Threat type and exploit kit names, if available
- Related samples used in related or linked attacks
- Separate lists of IP addresses and domains that are divided into more than 40 different categories and have a confidence score assigned for each category
Results indicate recent levels of activity and are aggressively aged to reflect current conditions. Multiple formats are supported, including TXT, CSV, JSON and compressed. All threat intelligence sources are based on behavior directly observed by the Proofpoint ET lab. All can be sent directly to SIEMs, next-generation firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS), and authentication solutions.
VULNERABILITY SCANER – DETECTION & REMEDIATION
Vulnerability scanning is the inspection of potential exploit points on a computer or network in order to identify security vulnerabilities.
- detects and classifies system weaknesses in computers, networks and communication equipment,
- anticipates the effectiveness of the remedial measures.
The scanner compares the details of the target attack surface with a daily updated database containing information about known service and port vulnerabilities, package design anomalies, and potential paths to exploitable programs or scripts. The scanner software tries to exploit each detected vulnerability.
Keep in mind that for each vulnerability there are dozens (if not hundreds) of exploits – this is why vulnerability mitigation is the most effective way to defend your system. There are different modes of action for the vulnerabilities detected: repair, mitigate or accept.
With the Vulnerability Scanner you will have the luxury of choice!