No Two Networks Devices Are Alike: Prioritize Based on Your Network

Presented by

Noam Syrkin, Sr. Tech Marketing Engineer // Brad Schwab, Sr. Solutions Consultant // Bill Burge, Sr. Solutions Consultant

About this talk

Identifying the right vulnerabilities is a real challenge. Scanner data generates tens of thousands (maybe even hundreds of thousands) of vulnerability results, sometimes scattered between different vendors (Rapid7, Qualys, Tenable, and more) and makes it a ‘whack-a-mole’ activity. A proper vulnerability management plan should be able to identify the top vulnerabilities to patch or find the exact path an attacker can take. But to divert, contain or block intruder access requires information like: - Where are the assets located and if/how could they be accessed? - If the asset is compromised, what else does the attacker get access to? - Does the compromised asset have internet access? In this August 24th webinar, learn how customers use RedSeal to help them: - Prioritize asset vulnerabilities based on network context - Identify areas that scanners miss and their causes - Consolidate vulnerability scan data from multiple sources

Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (26)
Subscribers (2518)
By focusing on cybersecurity fundamentals, RedSeal helps government agencies and Global 2000 companies measurably reduce their cyber risk. With RedSeal’s cyber terrain analytics platform and professional services, enterprises improve their resilience to security events by understanding what’s on their networks and how it’s all connected. RedSeal verifies that network devices are securely configured; validates network segmentation policies; and continuously monitors compliance with policies and regulations. It also prioritizes mitigation based on each vulnerability’s associated risk.