ServiceNow Security Operations and IT Operations Management

Logo
Presented by

Karl Klaessig, Director of product marketing, Security, ServiceNow

About this talk

Listen to the presentation hosted by ServiceNow's Director of Product Marketing, Karl Klaessig, discuss how Security Operations and IT Operations Management (ITOM) unite to accelerate detection and remediation for critical vulnerabilities. Discussion topics include: - Understand Your Attack Surface ITOM Discovery and Service Mapping provides a centralized data repository of assets across infrastructure, cloud, and applications. File-based Discovery also helps you identify what software is running on your Windows and UNIX servers and devices and can create alerts when vulnerable files are detected. - Mitigate Attack Surface Risk Vulnerability Response provides powerful integrations with vulnerability scanning platforms such as Qualys, Tenable, Rapid7 and others to collect existing vulnerability data on your assets into ServiceNow for immediate cross analysis and action of vulnerabilities like log4shell. - Bring it All Together With ServiceNow Vulnerability Response and IT Operations Management, your teams can automatically prioritize vulnerabilities and assign for remediation – accelerating prioritization, triage and remediation. Using business context, vulnerability severity, and exploitability to focus on what matters most and bringing all relevant data into a single platform for collaboration and efficient response. Streamline patch management with optimized workflows and patch orchestration capabilities to drive consistent, effective, and scalable response to the vulnerability life cycle. Speaker: Karl Klaessig, Director of product marketing, Security, ServiceNow
Related topics:

More from this channel

Upcoming talks (7)
On-demand talks (96)
Subscribers (3308)
Transform your security operations the same way you are transforming your business with automation, AI, context, and collaboration between security, IT, and risk teams. You can identify, prioritize, and respond with agility to evolving cyber threats. We can also help you get proactive to improve your security by systematically hardening and reducing your digital attack surface and optimizing and orchestrating your security operations.