Leading cyber risk management and threat intelligence provider Outpost24 announced the release of
Threat Explorer,
an advanced vulnerability intelligence and custom alerting tool for
continuous threat monitoring. The new module, available as a part of the
Threat Compass threat intelligence solution, provides a timely source
of vulnerability intelligence, enabling organizations to be alerted on
the latest vulnerability exploits and prioritize remediation.
As the threat landscape continues to evolve and cybercrime costs projected to grow ($10.5 trillion annually by 2025), organizations need a better understanding of attackers' behaviors and potential impact on their business.
"Threat Explorer correlates CVEs with affected technologies and systems
(CPE), giving customers access to unprecedented insights into
vulnerabilities impacting their organizations, with risk-based scoring
to comprehend and mitigate the risks they face," said Brendan Hogan,
Chief Strategy Officer at Outpost24. "The Threat Explorer module is a
great complement to our cyber threat intelligence solution
by providing custom alerting and reporting of system weaknesses that
could later become vulnerabilities. Organizations are empowered to
proactively counter risks and reduce the window of exposure before they
can be exploited."
Key features in Outpost24 Threat Explorer
With Threat Explorer, organizations can see and manage where they are
most vulnerable and prioritize remediation or scan based on risk context
and specific systems affecting them. It provides security teams with
high fidelity vulnerability intelligence into potential threats and the
confidence to make informed remediation decisions:
-
Real-time notifications about newly published CVEs affecting your systems (CPE correlation)
-
Automatic detection of critical threats for targeted vulnerability scanning
-
Remediation prioritization using risk-based scoring by combining CVSS with exploit availability
Threat Explorer is available immediately and delivered by API. For more information and to request a demo, please visit the Threat Intelligence product page.