Release notes

2024-01-31: Beyond Trust integration & Oracle Cloud Scanning support

Enhanced Credential Management with BeyondTrust PAM 

We are thrilled to announce integration with BeyondTrust's Privileged Access Management (PAM) solution. This new feature can drastically improve how credentials are managed during vulnerability scanning, ensuring heightened security and compliance. 

Credentials for scans can be securely stored in BeyondTrust's PAM solution. Before each scanning session, our system automatically retrieves the necessary credentials from BeyondTrust PAM. This eliminates the need to store credentials in Security Center. 

After a scan is completed, you can optionally configure BeyondTrust to change and rotate the credentials automatically. This dynamic rotation significantly enhances security by minimizing the window of opportunity for credential misuse.

Read more:
How do I get started with BeyondTrust PAM?

Introducing support for Oracle Cloud using Cloud Scanning 

With the increasing adoption of cloud services, security in the cloud has never been more critical.  

We are excited to announce support for Oracle Cloud using our CSPM (Cloud Security Posture Management) product, Cloud Scanning. This powerful addition enables organizations to seamlessly assess, identify, and address vulnerabilities and misconfiguration and optimize cost savings in their Oracle Cloud environments. Empowered by our agentless solution, you can quickly begin to risk assess your cloud accounts. 

Our Oracle Cloud scanning solution ensures comprehensive coverage by addressing the 100 most common misconfigurations across 12 essential Oracle services. 

This new feature also provides valuable insights into your Oracle Cloud usage. It identifies underutilized resources and offers recommendations for cost optimization, helping you maximize your cloud investment.

Read more:
How do I start scanning Oracle Cloud?

Want to get started with Cloud Scanning? 
To get started with Cloud Scanning, please contact your Customer Success or Sales Representative or email sales@holmsecurity.com

Several Improvements to Unified Assets & Vulnerabilities  

We have delivered several improvements to Unified Vulnerabilities that further strengthen it as you review and manage your threats.  

  • This release includes several performance optimizations to improve your experience as the number of threats and assets increase in your account. We will continue to optimize the speed of the dashboard and its related actions to achieve the best user experience.  
  • Disabled or ignored vulnerabilities are now also marked in the overview, making it easy to understand what is ignored and when it expires. 
  • For Unified Assets, we have analyzed data and improved the account risk score algorithm, aligning it with companies of all sizes with different threats and assets.  

Read more: 
How does risk score work?

Identifying more ransomware - improved threat intelligence with CISA  

We are happy to announce a vulnerability list, the Cybersecurity and Infrastructure Security Agency's (CISA). Known Exploited Vulnerabilities (KEV). Data from CISA KEV enriches our threat intelligence capabilities, providing deeper insights into threats. 

By leveraging this authoritative catalog of vulnerabilities exploited in ransomware, our customers can benefit from enhanced visibility into the threat landscape, which helps them assess their overall risk. 

Read more: 
How does threat score work?

New coverage for API Scanning 

We have significantly expanded our web and API scanning capabilities by adding coverage for more than 20 new API vulnerabilities. This enhancement ensures even more robust protection for your digital assets in today's API-driven world. 

Below are a few examples of the new coverage for OpenAPI:  

  • Path Brute-Forcing 
  • Stack Traces in Response 
  • Security Schema Not Defined 
  • Path Brute-Forcing 
  • Broken Authentication in API Paths 
  • API Input Type Injection 
  • API Path Rate-Limiting Not Enabled 

Want to get started with API Scanning? 
If you want to get started with API Scanning, please contact your Customer Success or Sales Representative or email sales@holmsecurity.com

Read more:
How do I get started with API scanning?

Other enhancements 

  • Certain optional columns are now correctly set as optional when importing assets. 
  • Several performance optimizations have been made to views related to devices using Device Agent. 
  • We addressed an issue with the comparison report where specific numbers could have been incorrect.