New powerful features to Unified Vulnerabilities
The recently released Unified Vulnerabilities allows you to view all your threats in one single overview, prioritized using the new intelligent threat score. Today we are happy to announce a few more features that empower your work within Unified Vulnerabilities.
- Tab views
Tab views are now fully supported and can be customized to your needs, using the filtering on the page to create your own focused views. It comes with a set of default views but also allows you to edit and create the ones you need. - Export to CSV
Export the full list of Unified Vulnerabilities to a CSV file to easily get the data and share it with other parties. - Related threats for recipients
Threats that impact your users and employees from Phishing & Awareness Training will now show related threats when viewing each of them to see easier what other threats could appear on your users and employees.
How do I apply a filter for a view?
Why is Holm Security focusing on unification?
One of the greatest challenges that our customers face is how to organize and prioritize risks, in other words, vulnerabilities that expose your organization to risk. Many organizations have multiple products to cover the attack surface, and there's no way to prioritize risk between the different attack vectors and products.
How do I benefit from unification?
In general, with unification, we bring assets and vulnerabilities from all your attack vectors in a single view. By doing this, we provide an unparalleled and efficient way to work with your assets and vulnerabilities. It helps you prioritize risk between all attack vectors and vulnerabilities and put your efforts where they are most needed.
How is unification a part of Next-Gen Vulnerability Management?
The foundation of Next-Gen Vulnerability Management stands on pillars that are important for a modern cyber defense, such as expanded complete attack vector coverage (everything from traditional infrastructure to cloud resources), including your users, and unification and unified risk score for efficient prioritization of vulnerabilities. Accordingly, unification is one of the pillars of Next-Gen Vulnerability Management.
What is the difference between traditional vulnerability management and Next-Gen Vulnerability Management?
Traditional vulnerability management focuses on traditional systems and today only covers a small part of your attack surface. Traditional vulnerability management doesn't provide one single view of assets and vulnerabilities to structure and prioritize vulnerabilities. Next-Gen Vulnerability Management covers your entire attack surface, including users, and provides unified views and a unified risk score to maximize efficiency in the work to strengthen your cyber defense. It also adds additional threat intelligence based on general exposure, ransomware, and exploits, to make it easier for you to prioritize risks.
How do I benefit from Next-Gen Vulnerability Management?
Next-Gen Vulnerability Management provides better attack surface coverage and more efficient and smarter ways to prioritize and work through the risks your company is facing. The result will be a stronger cyber defense with less time, resources, and money spent.
Prioritize your cloud results using the severity levels
Scanning of cloud environments can include a large number of results that you need to prioritize. To make this easier and understand how to prioritize across all the policies found within a cloud result, there is now a severity for each policy. The severity ranges from low to critical and will be available to be ordered within the cloud result view.
How to prioritize cloud policies using the severity
Export cloud results
Cloud scanning results can contain many different policies with information that allows you to identify and remediate them based on their results. To make it easy to work with this information with other parties and also have the ability to integrate the information into other systems, we have now released the feature to export cloud results to a CSV.
The CSV will include all information regarding cloud policies, including the meta-data on each divided up per region.
How to export cloud results to CSV?
Other enhancements
- Over 25 cloud policies have been added to increase our coverage across Microsoft Azure further.
- Details of cloud scan errors are now displayed on the scan status.
- Phishing & Awareness Training measurements have received improved accuracy to reduce false positives.
- Assets do now have less dependency on scan results, allowing you to delete scan results or assets without having to delete other objects.
- Policy scans now display more detailed information in case of an error.