Virtualization Technology News and Information
Article
RSS
Outpost24 Adds Threat Explorer to Threat Intelligence Platform for Advanced Vulnerability Intelligence and Exposure Time Reduction
Leading cyber risk management and threat intelligence provider Outpost24 announced the release of Threat Explorer, an advanced vulnerability intelligence and custom alerting tool for continuous threat monitoring. The new module, available as a part of the Threat Compass threat intelligence solution, provides a timely source of vulnerability intelligence, enabling organizations to be alerted on the latest vulnerability exploits and prioritize remediation.

As the threat landscape continues to evolve and cybercrime costs projected to grow ($10.5 trillion annually by 2025), organizations need a better understanding of attackers' behaviors and potential impact on their business.

"Threat Explorer correlates CVEs with affected technologies and systems (CPE), giving customers access to unprecedented insights into vulnerabilities impacting their organizations, with risk-based scoring to comprehend and mitigate the risks they face," said Brendan Hogan, Chief Strategy Officer at Outpost24. "The Threat Explorer module is a great complement to our cyber threat intelligence solution by providing custom alerting and reporting of system weaknesses that could later become vulnerabilities. Organizations are empowered to proactively counter risks and reduce the window of exposure before they can be exploited."

Key features in Outpost24 Threat Explorer

With Threat Explorer, organizations can see and manage where they are most vulnerable and prioritize remediation or scan based on risk context and specific systems affecting them. It provides security teams with high fidelity vulnerability intelligence into potential threats and the confidence to make informed remediation decisions:

  • Real-time notifications about newly published CVEs affecting your systems (CPE correlation)
  • Automatic detection of critical threats for targeted vulnerability scanning
  • Remediation prioritization using risk-based scoring by combining CVSS with exploit availability

Threat Explorer is available immediately and delivered by API. For more information and to request a demo, please visit the Threat Intelligence product page.

Published Monday, November 13, 2023 2:11 PM by David Marshall
Filed under:
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<November 2023>
SuMoTuWeThFrSa
2930311234
567891011
12131415161718
19202122232425
262728293012
3456789