Building an Advanced Vulnerability Management Program

SecPod
10 Aug 202253:34

Summary

TLDRIn the Segbot webcast, Jixy introduces Chandra Shaker, CEO of SecBod, who presents on advanced vulnerability management. Shaker discusses the importance of continuous visibility, assessment, prioritization, and remediation of vulnerabilities in cybersecurity. He highlights the challenges of traditional vulnerability management and introduces SecBod's Senarno platform, which unifies these processes into a single console for real-time vulnerability detection and automated remediation across IT environments, aiming to improve security effectiveness and compliance.

Takeaways

  • 😀 The Segbot webcast, hosted by Jixy, focuses on building an advanced vulnerability management program to help prevent cyber attacks for enterprise IT security teams globally.
  • đŸ‘„ Jixy introduces Chandra Shaker, the founder and CEO of SecBod, who discusses the importance of vulnerability management in the cybersecurity framework.
  • 🔒 Vulnerability management (VM) is a key component of the cyber attack prevention layer, emphasizing the need for continuous investment in prevention to reduce the need for reactive measures.
  • 🔄 The traditional vulnerability management lifecycle involves identifying, assessing, prioritizing, remediating, and reporting vulnerabilities, which should be a continuous and automated process.
  • 📈 Chandra highlights the pitfalls of vulnerability scanning, such as the time-consuming nature of the process and the volume of vulnerabilities that can be overwhelming for IT teams to manage effectively.
  • đŸ›Ąïž The talk addresses the need to go beyond software vulnerabilities and consider other risks like misconfigurations, asset exposures, and security control deviations that can be exploited by attackers.
  • đŸ€– The complexity of managing vulnerability management with multiple siloed tools is discussed, emphasizing the need for integration and automation to improve security effectiveness.
  • 🔑 Chandra proposes an advanced vulnerability management program with layers of visibility, identification, prioritization, remediation, and reporting, all integrated into a centralized management console.
  • 🌐 The importance of continuous visibility into the IT environment and the ability to assess and prioritize risks in real-time is underscored for effective vulnerability management.
  • đŸ› ïž The session discusses the integration of remediation controls within the same console used for vulnerability identification, allowing for immediate response to security risks.
  • 📊 The benefits of implementing an advanced vulnerability management program include increased security effectiveness, audit readiness, resource efficiency, and the ability to manage and eliminate the attack surface.

Q & A

  • What is the main focus of today's segbot webcast session?

    -The main focus of the segbot webcast session is on building an advanced vulnerability management program to prevent cyber attacks for enterprise IT security teams globally.

  • Who is the presenter for the vulnerability management topic in the webcast?

    -Chandra Shaker, the founder and CEO of SecBod, is the presenter for the vulnerability management topic.

  • How can I access the recorded version of the webcast session?

    -The recorded version of the webcast will be available on their Bright Talk channel and YouTube channel, and it will also be sent to the participants' email addresses after the session.

  • What is the typical life cycle of vulnerability management according to the script?

    -The typical life cycle of vulnerability management includes identifying vulnerabilities, assessing the risks involved, prioritizing those vulnerabilities, remediating them, and reporting the status after remediation.

  • What are some of the challenges faced in traditional vulnerability management as mentioned in the script?

    -Some challenges include the time-consuming nature of vulnerability scanning, dealing with voluminous reports, the complexity of managing multiple siloed tools, and the lack of automation and continuity in the process.

  • How does the script suggest improving the effectiveness of vulnerability management?

    -The script suggests improving effectiveness by implementing a continuous and automated vulnerability management program that integrates various aspects such as visibility, identification, prioritization, remediation, and reporting into a single console.

  • What is the significance of integrating multiple security tools into a single console as discussed in the webcast?

    -Integrating multiple security tools into a single console allows for better visibility, control, and automation of the vulnerability management process, making it more efficient and effective in preventing cyber attacks.

  • How does the script address the issue of new vulnerabilities being discovered daily?

    -The script emphasizes the need for a continuous and daily vulnerability scanning process toćŠæ—¶ć‘çŽ° and address new vulnerabilities as they emerge.

  • What are some of the key benefits of implementing an advanced vulnerability management program as outlined in the script?

    -Key benefits include increased security effectiveness, audit readiness at all times, resource efficiency, reduced cost of ownership, and the ability to manage and eliminate the attack surface more effectively.

  • How does the script differentiate between vulnerability management and security information event management (SIEM)?

    -The script differentiates by stating that vulnerability management operates in the prevention layer, focusing on managing the attack surface and eliminating potential weaknesses, while SIEM operates in the detection and response layer, focusing on detecting and responding to potential exploits or unwanted activities.

  • What is the role of threat intelligence in the vulnerability management platform discussed in the script?

    -Threat intelligence plays a crucial role in the platform by providing real-time updates on vulnerabilities, helping to prioritize them based on their exploitation in the wild, and supporting the development of a risk mitigation program.

  • How does the advanced vulnerability management program handle compliance with various regulatory standards?

    -The program includes built-in compliance templates for various standards such as PCI, HIPAA, and others, allowing users to generate reports that demonstrate compliance and export them as needed.

  • What deployment options are available for the advanced vulnerability management platform mentioned in the script?

    -The platform is available for both cloud-hosted and on-premise deployments, offering flexibility based on the organization's needs and environment.

Outlines

00:00

đŸ“ș Introduction to Segbot Webcast on Advanced Vulnerability Management

The session begins with Jixy introducing the Segbot webcast, focusing on advanced vulnerability management for enterprise IT security. Jixy welcomes the audience and introduces Chandra Shaker, CEO of SecBod, who will discuss vulnerability management. The webcast aims to cover the latest in cyber attack prevention and is recorded for later viewing on various platforms. A Q&A session is promised at the end, encouraging audience interaction through the chat.

05:02

🔒 The Challenge of Traditional Vulnerability Management

Chandra Shaker delves into the challenges of traditional vulnerability management, noting the time-consuming nature of scanning activities and the overwhelming reports they generate. He highlights the gap between vulnerability discovery and effective remediation, the rapid pace of new vulnerability discoveries, and the complexity of managing multiple tools. Chandra emphasizes the need for a more integrated, automated, and continuous approach to vulnerability management to reduce the attack surface and improve security effectiveness.

10:02

đŸ€” Key Questions in Vulnerability Management

Chandra poses three critical questions regarding vulnerability management: uncovering IT risks beyond software vulnerabilities, identifying the ownership for remediating vulnerabilities, and understanding why vulnerability management is not continuously automated like other IT processes. He stresses the importance of addressing these questions to improve security postures and prevent potential attacks.

15:03

đŸ›Ąïž Proposing an Advanced Vulnerability Management Program

The discussion shifts to an advanced vulnerability management program that Chandra proposes, which includes layers for visibility, identification, prioritization, remediation, and reporting. He emphasizes the need for continuous visibility into the IT environment, the ability to assess and prioritize risks, integrated remediation capabilities, and effective reporting. The goal is to create a unified and automated process for better cybersecurity management.

20:04

🔍 Deep Dive into the Visibility and Identification Layers

Chandra elaborates on the importance of continuous visibility and the identification of a wide range of vulnerabilities, including software, misconfigurations, and asset exposures. He discusses the need for daily assessments and the integration of external data feeds, like threat intelligence, to prioritize vulnerabilities effectively. The focus is on understanding the cybersecurity posture and identifying critical vulnerabilities that require immediate action.

25:06

đŸ› ïž Remediation Strategies and Automation

The session continues with Chandra discussing remediation strategies that go beyond patching software vulnerabilities to include system hardening and addressing security control deviations. He highlights the significance of automation in vulnerability management, emphasizing the need for daily scans, real-time response to security drifts, and the application of security patches and controls through a centralized console.

30:09

📊 Benefits of an Advanced Vulnerability Management Program

Chandra outlines the benefits of implementing an advanced vulnerability management program, including increased security effectiveness, audit readiness, integrated risk visibility, and resource efficiency. He explains how a centralized management console provides a unified view of risks and remediation controls, leading to a more efficient and cost-effective vulnerability management process.

35:09

🌐 Introducing SecBod's Senarno Platform for Cyber Hygiene

Chandra introduces SecBod's Senarno platform, a cyber hygiene solution that unifies vulnerability management into a single console. The platform supports various devices and integrates multiple tools for vulnerability detection, configuration management, patch management, asset exposure, and endpoint management. It operates in real-time, providing visibility and control for an effective vulnerability management program.

40:11

đŸ“© Q&A Session and Closing Remarks

The session concludes with a Q&A segment where Chandra addresses questions about the differentiation of SecBod's solution from competitors, the availability of presentation materials, on-premise installation options, and the integration with other security solutions. He also discusses the platform's capabilities for OT environments and its use of threat intelligence. The session ends with an invitation for a free trial of the Senarno platform and acknowledgments of the audience's participation.

Mindmap

Keywords

💡Vulnerability Management

Vulnerability Management is a critical component of cybersecurity that involves the identification, assessment, prioritization, and mitigation of vulnerabilities in an IT environment. It is central to the video's theme, as the discussion revolves around building an advanced vulnerability management program to prevent cyber attacks. The script mentions the vulnerability management lifecycle, emphasizing its importance in the prevention layer of the cybersecurity framework.

💡Cyber Attack Prevention

Cyber Attack Prevention is the main theme of the video, focusing on strategies and tools to stop potential threats before they can cause harm. The script discusses how a robust vulnerability management program can serve as a key element in preventing cyber attacks by reducing the attack surface and ensuring continuous monitoring and remediation of vulnerabilities.

💡Enterprise IT Security Teams

Enterprise IT Security Teams are responsible for the protection of an organization's information systems. In the context of the video, these teams are the target audience for the segbot webcast, as they are the ones who would implement advanced vulnerability management programs to safeguard their enterprise against cyber threats.

💡Attack Surface Management

Attack Surface Management refers to the process of identifying, assessing, and reducing the potential points of attack on a network or system. The script mentions this concept as a key element of vulnerability management, emphasizing the need to manage and reduce the attack surface to prevent cyber attacks.

💡CVE Identifier

CVE (Common Vulnerabilities and Exposures) Identifier is a unique reference number given to publicly known cybersecurity vulnerabilities. The script uses this term to illustrate the vast number of known vulnerabilities that are discovered daily and how they are tracked and managed within a vulnerability management program.

💡Misconfigurations

Misconfigurations are incorrect settings or configurations in software, systems, or networks that can lead to security vulnerabilities. The video script discusses the importance of identifying and remediating misconfigurations as part of a comprehensive vulnerability management strategy.

💡Security Posture

Security Posture refers to the overall state of an organization's cybersecurity defenses. The script mentions achieving a desired security posture as the ultimate goal of implementing a vulnerability management program, which involves continuous assessment and improvement of security measures.

💡Automation

Automation in the context of the video refers to the use of technology to automatically perform tasks within the vulnerability management process. The script highlights the need for automation to streamline the process of discovering, prioritizing, and remediating vulnerabilities, making it more efficient and reducing the window of opportunity for attackers.

💡Continuous Visibility

Continuous Visibility is the ongoing monitoring and awareness of an IT environment's state, including the detection of changes and potential risks. The video script emphasizes the importance of continuous visibility for effective vulnerability management, allowing security teams to identify and respond to new threats promptly.

💡Remediation Controls

Remediation Controls are the measures or actions taken to mitigate or eliminate identified vulnerabilities. The script discusses the need for an integrated remediation capability within a vulnerability management program, allowing for the application of security patches and other controls to address vulnerabilities.

💡Security Information Event Management (SIEM)

SIEM is a system for real-time analysis of security alerts generated by networks and applications. The script differentiates SIEM, which operates in the detection and response layer, from vulnerability management, which focuses on the prevention layer. The two can be integrated to enhance overall security by providing a more comprehensive view of an organization's security landscape.

💡Compliance

Compliance in this context refers to adhering to industry standards, regulations, and benchmarks for security. The video script mentions the ability of an advanced vulnerability management program to ensure continuous compliance with various security guidelines, such as PCI and HIPAA, by maintaining a strong security posture and providing necessary reports.

💡Threat Intelligence

Threat Intelligence is the information about potential threats, including details about vulnerabilities being exploited in the wild. The script discusses how threat intelligence can be integrated into a vulnerability management platform to prioritize vulnerabilities based on real-world risks and to inform timely remediation efforts.

Highlights

Introduction to Segbot Webcast and its focus on preventing cyber attacks through advanced vulnerability management.

Chandra Shaker, founder and CEO of SecBOD, discusses the importance of vulnerability management in cybersecurity.

The session emphasizes building a program that can manage vulnerabilities effectively to prevent cyber attacks.

Availability of the recorded webinar on Bright Talk and YouTube channels for further learning.

The vulnerability management lifecycle explained, including identification, assessment, prioritization, remediation, and reporting.

Challenges in vulnerability scanning, such as time consumption and the volume of vulnerabilities reported.

The need for a more integrated and automated approach to vulnerability management to reduce the attack surface.

Discussion on the limitations of current vulnerability management tools and the need for a unified solution.

Importance of continuous visibility into the IT environment and the integration of various security controls.

The role of machine learning and predictive capabilities in identifying and prioritizing vulnerabilities.

The benefits of an advanced vulnerability management program, including increased security effectiveness and audit readiness.

How Senarno Platform by SecBOD unifies vulnerability management into a single console for comprehensive security.

Explanation of the different modules within the Senarno Platform, including VM, CM, PM, and Asset Exposure.

The platform's ability to work with various types of devices and operating systems for vulnerability detection.

The significance of threat intelligence in prioritizing vulnerabilities and the platform's integration with such feeds.

How the platform supports both cloud and on-premise deployment options for organizations.

The conclusion summarizing the key points of implementing an advanced vulnerability management program.

Transcripts

play00:05

hello everyone and welcome to today's

play00:06

session of segbot webcast

play00:09

i'm jixy your host through segbot

play00:11

webcast we bring you the latest

play00:13

happening set report

play00:15

and exciting stuff we are working on to

play00:18

prevent cyber attacks for enterprise i.t

play00:21

security teams globally

play00:23

today's session is on building an

play00:26

advanced vulnerability management

play00:27

program i'd like to introduce the rest

play00:29

presented

play00:30

i have with me chandra shaker founder

play00:33

and ceo of secbod

play00:35

chandra will talk to you about an

play00:37

interesting topic on vulnerability

play00:38

management i'm excited to listen

play00:41

hope you're all hooked up to

play00:44

before we begin i'd like to remind uh

play00:46

all uh that our recorded version of this

play00:49

webinar will be

play00:50

available on

play00:52

our bright talk channel as well as our

play00:54

youtube channel we will also send it

play00:56

according to your email address uh after

play00:59

this session so you can watch it and

play01:01

share it

play01:02

share with others in your team

play01:04

towards the end of the session we will

play01:06

have a q a q a uh quick q a i would love

play01:10

to hear from you um whatever questions

play01:12

you have chandra is here to answer

play01:15

uh all your questions you can post your

play01:17

questions in the chat box

play01:19

just below your bright talk video player

play01:24

for those of you just joining welcome

play01:26

over to each other audience is always

play01:30

all right thank you jax here good

play01:32

morning everyone good afternoon and good

play01:34

evening i know we have people joining

play01:36

from

play01:37

these geographies

play01:39

around the world

play01:40

thank you everyone for taking the time

play01:42

to be part of this session

play01:44

if you're already into vulnerability

play01:46

management or revisiting your

play01:48

vulnerability management program

play01:52

or you're not realizing the

play01:55

the security effectiveness that you set

play01:58

out to

play01:59

while implementing your vulnerability

play02:01

management program

play02:04

or

play02:06

trying to manage your attack surface or

play02:09

reducing the attack surface so i believe

play02:11

this session is going to be

play02:14

useful

play02:16

for you

play02:20

now

play02:21

vm or vulnerability management as you

play02:23

know is a

play02:26

key component of the cyber attack

play02:29

prevention

play02:30

layer

play02:31

so if you look at the

play02:33

cyber security framework you have

play02:35

prevention detection response and

play02:38

recovery

play02:39

and vulnerability management or attack

play02:41

surface management is one of the key

play02:47

element

play02:48

as part of the prevention layer

play02:50

the more you invest

play02:52

your effort into prevention the less

play02:55

fire fighting that you'll have to

play02:57

deal with at the detection and response

play03:00

layer

play03:01

as they say prevention is better than

play03:03

cure

play03:04

i can slightly modify that and say

play03:06

prevention is

play03:08

better than

play03:09

detection response here obviously you

play03:12

don't want to get into a recovery stage

play03:15

if you want to prevent all possible

play03:17

cyber attacks before before attackers

play03:20

are able to succeed

play03:22

and vulnerability management

play03:27

if implemented properly will help us

play03:30

get to that scenario

play03:34

personally i have been in the

play03:36

vulnerability management industry of

play03:37

cyber security industry for over two

play03:40

decades now and i have been

play03:42

looking at this wheel

play03:45

for more than 15 years or so

play03:49

and this is typically what vulnerability

play03:52

management life cycle is all about

play03:54

identifying the vulnerabilities

play03:56

assessing the vulnerabilities to

play03:58

understand the risks involved

play04:00

prioritizing those vulnerabilities that

play04:03

must be

play04:04

dealt with

play04:05

and remediate those vulnerabilities

play04:09

and report those

play04:12

after remediating even before

play04:14

remediating you want to understand and

play04:16

then

play04:16

after remediating you want to know that

play04:19

those vulnerabilities are actually

play04:21

eliminated and this has this is a cycle

play04:25

cyclic process uh supposed to be a

play04:28

continuous

play04:29

process

play04:31

and this particular field there's

play04:33

nothing wrong in it simple elegant if

play04:36

implemented correctly we will be able to

play04:39

achieve that

play04:40

cyber security posture that we all uh

play04:43

want to achieve in order to prevent

play04:47

attacks

play04:50

i have been part of the early nessus

play04:52

development effort in ways and scap and

play04:57

oval most recently in the security

play04:59

automation

play05:01

side of

play05:03

the the technology

play05:04

and i have been seeing this particular

play05:06

deal

play05:07

it has not changed since then it has

play05:09

been the same

play05:11

and as i mentioned earlier it is

play05:14

if implemented correctly we would be

play05:16

able to achieve the goal that we all

play05:18

want to

play05:21

but the pitfall

play05:22

is

play05:24

here

play05:26

number one is vulnerability scanning

play05:28

activity itself takes

play05:31

weeks together to perform

play05:34

and then when you have the

play05:36

scanning activity completed you

play05:39

you are provided with a report that runs

play05:42

into thousands of pages

play05:44

and post that as a security

play05:46

administrator of the it operations team

play05:49

you are responsible for

play05:51

understanding this vulnerability

play05:54

prioritize those vulnerability identify

play05:56

what is my mitigation to to

play05:59

overcome that vulnerability and then

play06:02

apply a security

play06:04

patch or other remediation controls that

play06:06

that you may want to in order to

play06:08

eliminate that vulnerability

play06:10

and this exercise uh takes anywhere

play06:13

typically between three to five months

play06:15

to complete it and that is a

play06:17

large window of opportunity for

play06:19

attackers to exploit

play06:21

and we all know that there are at least

play06:23

30 to 50 new vulnerabilities being

play06:25

discovered on a

play06:27

day-to-day basis

play06:29

these are known vulnerabilities that

play06:31

have the cve identifier assigned

play06:34

by nest

play06:36

but there are good number of

play06:37

vulnerabilities that

play06:39

may never have a cv identifier a sign

play06:42

but they are still vulnerabilities that

play06:44

are

play06:45

attackers are exploiting those so this

play06:48

is one side on the software

play06:50

vulnerability but there are risks that

play06:52

go beyond software vulnerabilities

play06:55

maybe security controls that are

play06:58

not

play06:59

appropriately implemented they can be

play07:01

misconfigurations they can be unwanted

play07:03

software assets etc present so

play07:06

these are never discovered as part of

play07:08

the attack surface management initiative

play07:10

that we

play07:11

implement

play07:13

and then again even if you want to

play07:15

implement this

play07:17

lifecycle vulnerability management

play07:19

lifecycle process

play07:21

we may have to invest in at least

play07:23

five to six different tools or products

play07:27

in order to achieve that particular goal

play07:29

and each of them operate in silo

play07:31

they do not talk to each other

play07:34

and you need to have the resources

play07:36

who are skilled to handle these

play07:39

products understand

play07:42

from one to another and

play07:46

and apply the controls that we want to

play07:49

so the complexity is there and that is

play07:50

why

play07:52

the effectiveness that we want to

play07:54

achieve is not there

play07:55

because of the manual interventions that

play07:57

require lack of automation and

play07:59

continuity

play08:01

in this entire process it makes it

play08:03

extremely cumbersome to implement

play08:06

a continuous and automated vulnerability

play08:09

management program

play08:10

but beyond that

play08:12

as i mentioned multiple siloed products

play08:15

operating

play08:18

in silo because of this

play08:21

we won't be able to apply the the

play08:22

remediation controls that we want to

play08:26

because

play08:28

the vulnerability management product

play08:29

does not feed its findings into a

play08:32

remediation product for example the

play08:34

patch management product

play08:36

so all of this make it extremely

play08:38

cumbersome

play08:40

to achieve that security effectiveness

play08:42

that we all look to achieve and

play08:45

either managing or eliminating the

play08:47

attack surface becomes

play08:50

a tedious

play08:52

task and time consuming task and a lot

play08:55

of effort is involved in implementing

play08:58

that

play09:01

now that leaves us with these three

play09:05

questions

play09:07

question number one is are we uncovering

play09:09

all the i.t

play09:11

risks that are there

play09:14

beyond vulnerabilities not just the

play09:16

software vulnerabilities but other kinds

play09:18

of world merit like this

play09:20

the second question is that

play09:24

who takes the ownership for remediating

play09:27

these vulnerabilities vulnerabilities

play09:29

are discovered but

play09:31

who is supposed to

play09:33

remediate these vulnerabilities that is

play09:35

the second question and the third

play09:37

question is

play09:39

why are these not continuous and

play09:41

automated and everywhere else there's

play09:46

continuous integration and continuous

play09:48

delivery for example and

play09:50

all of these are becoming

play09:53

the norm

play09:55

elsewhere but in the vulnerability

play09:56

management space the continuous and

play09:59

automation has not become the norm

play10:01

so there is no single console where i

play10:04

can implement a vulnerability management

play10:06

program

play10:07

and

play10:08

successfully achieve

play10:10

the security effectiveness goal that we

play10:12

all

play10:12

aspire to achieve

play10:16

so

play10:18

are there security risks beyond the

play10:20

software vulnerabilities yes so you have

play10:23

misconfigurations

play10:25

the operating systems and the

play10:26

applications and the network devices

play10:29

properly maybe not configured

play10:31

appropriately

play10:32

as per the the security baseline that

play10:35

you would want to

play10:36

there can be

play10:38

asset exposures outdated

play10:40

assets present for example and unwanted

play10:43

applications unauthorized services

play10:46

running

play10:47

there can be critical

play10:48

security patches that are not rolled out

play10:50

which should have been rolled out

play10:53

and there can be additional security

play10:55

controls that may not be working as you

play10:57

would expect

play11:00

as you want them to

play11:01

work maybe a firewall is disabled

play11:04

maybe you've enabled

play11:06

a

play11:07

file system level encryption and that is

play11:09

not appropriately implemented or maybe

play11:13

the the anti-malware product that you

play11:15

have

play11:16

installed is not running properly so all

play11:19

of these can be the security controls

play11:22

deviations in the security controls that

play11:24

you have already implemented

play11:26

but there can also be other types of

play11:29

posture related anomalies that can be

play11:31

present

play11:32

within the environment so if you look at

play11:34

the attack surface holistically

play11:37

across the the it landscape all of these

play11:40

are equally important equally critical

play11:42

and an attacker can exploit any of these

play11:47

with ease if these are

play11:50

widely open

play11:52

so it's important that we have that we

play11:54

deal with each of these

play11:56

risks beyond the software

play11:58

vulnerabilities

play12:02

now the second question that we had was

play12:05

who takes the ownership for mitigating

play12:08

these vulnerabilities not just

play12:09

discovering all the

play12:11

problems and generating a report that

play12:13

runs into thousands of pages but

play12:15

is there a

play12:17

mitigation available

play12:19

maybe through deployment of security

play12:21

update that is available for operating

play12:23

systems and applications

play12:26

or it can be some of these

play12:29

unwanted services and

play12:31

ports that are open you may have to turn

play12:34

them off or there are certain services

play12:37

that you want them to be running but

play12:38

they are not running so you may want to

play12:41

run those

play12:42

as necessary

play12:46

as in a requirement so

play12:48

without that

play12:50

capability to remediate those risks that

play12:53

are identified uh the again the

play12:56

effectiveness is

play12:57

kind of

play12:58

broken and you're not able to achieve

play13:00

that goal

play13:02

and third and the most important one is

play13:06

why is it not continuous and automated

play13:08

why wouldn't we be able to

play13:11

make this

play13:13

discovery process into a day-to-day

play13:16

activity and also the remediation

play13:22

so it is essential that we make it into

play13:24

a continuous process because newer

play13:27

vulnerabilities are being discovered

play13:28

every day

play13:30

and

play13:31

it environment is also changing every

play13:33

day this is not anymore an audit driven

play13:36

approach where i would run a scan once

play13:38

in a month or a quarter

play13:40

and just to meet the

play13:42

the needs of

play13:44

the audit that

play13:46

that is due

play13:47

but it needs to be a continuous and

play13:49

automated process it needs to be a daily

play13:52

routine that we

play13:55

uncover the risks mitigate the risks

play13:58

make it into a routine where i'm

play14:00

achieving that

play14:02

goal

play14:03

so all of these three things are really

play14:06

important to establish

play14:08

a cyber hygiene posture

play14:14

that we want to

play14:16

so the

play14:19

without that

play14:21

what we are left with this very low

play14:24

certainty because we don't know if we

play14:26

have found or discovered all the

play14:28

vulnerabilities that are out there

play14:31

from misconfigurations to security

play14:33

control deviations to asset exposure etc

play14:36

second

play14:39

we don't have that control sense of

play14:41

control

play14:42

that we want to have because we have

play14:45

discovered number of problems but we

play14:47

have not actually mitigated those

play14:49

problem and it is a time consuming

play14:51

process

play14:52

and we are living with those

play14:54

vulnerabilities without

play14:56

mitigation the third is not having that

play15:00

continuity or an automated

play15:03

approach to

play15:04

solving this problem

play15:08

so what we

play15:09

propose

play15:11

in an advanced vulnerability management

play15:13

program is

play15:15

these layers visibility identify assets

play15:19

prioritize remediate and report it's

play15:22

nothing different

play15:24

from the wheel that we talked about

play15:26

but what we do in each of these layers

play15:29

uh matter the most one is do we have

play15:32

continuous visibility into the i.t

play15:34

environment

play15:35

are we able to identify all sorts of

play15:37

risks that the nit environment is

play15:39

subjected to

play15:41

can we assess those risks understand

play15:43

those risks and prioritize those risks

play15:46

and do we have an integrated remediation

play15:48

capability where i can go ahead and fix

play15:50

all those risks that are identified and

play15:53

then finally

play15:54

reporting these

play15:57

controls that i have applied in

play16:00

to fix these deviations that we found

play16:03

out and have that sense of confidence a

play16:05

sense of control that we have actually

play16:07

taken care of

play16:08

each of those problems that are

play16:10

discovered

play16:11

more importantly

play16:13

if you see the

play16:15

the interface between them

play16:17

each of these layers must be

play16:20

integrated

play16:22

the the findings from the visibility

play16:24

goes into identified

play16:26

identification layer and that goes into

play16:28

the assessment and prioritization layer

play16:31

and so on and so forth

play16:33

and it has to be

play16:35

integrated as well

play16:37

having a central uh centralized

play16:40

management console where i'm having

play16:42

visibility to all of these

play16:44

and i'm able to apply the controls that

play16:47

i want to apply

play16:49

to mitigate those risks that are

play16:51

identified

play16:52

so this is the the framework

play16:55

that we propose for implementing an

play16:58

advanced vulnerability management

play17:02

program but let's look at each of these

play17:05

layers and see what is really necessary

play17:09

from

play17:10

from the

play17:11

little bit of technical details

play17:15

that each of these layers

play17:18

should have

play17:19

one is visibility

play17:21

getting visibility over the the itself

play17:24

when i say visibility it is the

play17:26

continuous visibility you want to know

play17:27

what changes are taking place

play17:29

you want to know which system joined the

play17:32

network you want to know if there are

play17:34

shadow id

play17:36

and unauthorized and

play17:39

unwanted applications present within the

play17:41

environment or if some service is

play17:44

running which is not supposed to be

play17:45

running or some users have logged in who

play17:47

are not supposed to be

play17:49

logging in so

play17:51

likewise you will have that need to know

play17:54

what is going on within the environment

play17:56

in real time and without visibility it

play17:58

is impossible to achieve

play18:00

security and that is a primary need

play18:03

for

play18:04

for any organization to implement a

play18:07

cyber security

play18:08

posture management

play18:12

now from visibility it's all about

play18:14

discovering the vulnerabilities and i

play18:16

say the vulnerability term here

play18:19

it encompasses all of those from

play18:21

software vulnerabilities to

play18:22

misconfigurations to

play18:24

asset exposure missing security patches

play18:27

and security controls deviations etc

play18:31

so it's important that we assess

play18:34

discover all sorts of vulnerabilities

play18:37

within the it environment and this has

play18:39

to happen

play18:41

daily

play18:45

and

play18:45

assessing and prioritizing is also

play18:48

an important layer once i have

play18:51

discovered all the vulnerabilities

play18:54

can run into thousands of

play18:56

vulnerabilities and in some cases

play18:58

hundreds of thousands of vulnerabilities

play19:00

if you were to club all all of those

play19:02

different types

play19:04

now it is important to assess understand

play19:07

what is the risk exposure each of these

play19:09

vulnerabilities present

play19:11

and prioritize those vulnerabilities and

play19:14

in order to prioritize the

play19:15

vulnerabilities you may have certain

play19:18

variables coming in from the external

play19:21

feed as well maybe

play19:23

a threat intelligence telling us that

play19:26

this particular vulnerability is widely

play19:28

exploited

play19:29

or it can be a asset criticality itself

play19:32

maybe a

play19:33

particular server that is running a very

play19:36

critical or business critical

play19:37

application and that needs to be

play19:39

safeguarded fast so any vulnerability in

play19:42

that environment becomes

play19:44

extremely important and critical to fix

play19:48

now

play19:49

we may be able to

play19:50

bring in some machine learning and

play19:53

predictive capability as well to

play19:54

identify a particular vulnerability that

play19:57

can go on to become

play19:59

popular in terms of how widely it is

play20:02

going to be exploited

play20:04

and we should also have that attacker's

play20:06

perspective of understanding what these

play20:08

vulnerabilities are

play20:10

or and how do we how an attacker could

play20:13

exploit these vulnerabilities if we let

play20:15

them open

play20:17

so all this can be

play20:18

[Music]

play20:21

put into some sort of a scoring

play20:24

mechanism to to understand the

play20:27

cyber security posture

play20:30

that we have within the environment

play20:32

and when we do that we will exactly know

play20:34

uh what vulnerabilities are

play20:38

there which are critical that i must act

play20:41

upon immediately

play20:42

what are those vulnerabilities that i

play20:44

can wait for maybe a couple of days so

play20:47

that kind of prioritization it will help

play20:49

us

play20:51

when when essentially especially when

play20:53

you have too many vulnerabilities that

play20:55

you want to deal with and you want to

play20:57

prioritize and act upon those

play20:58

vulnerabilities

play21:04

the next layer is the remediation of

play21:06

these vulnerabilities so typically

play21:08

vulnerabilities

play21:10

software vulnerabilities are

play21:12

dealt with by applying the security

play21:14

updates on the operating systems and

play21:16

third-party application

play21:19

software that are installed in the

play21:20

environment

play21:22

but

play21:23

having the the software patches rolled

play21:25

out alone is not enough this there are

play21:28

misconfigurations where you'll have to

play21:30

apply the the system hardening measures

play21:33

both at the operating system level

play21:35

application levels and even for the

play21:37

network devices that are present within

play21:39

the environment

play21:40

we need to fix those security controls

play21:43

that are deviating

play21:44

and posture anomalies that could be

play21:47

there that need that needs to be

play21:49

dealt with as well so

play21:51

some of the examples could be you have

play21:53

an unauthorized application

play21:56

installed within the environment you may

play21:58

have to you may want to uninstall that

play22:00

particular application maybe the

play22:03

firewall policy is disabled and you will

play22:05

not enable that

play22:06

anti-malware product itself is not

play22:08

running properly you may have to start

play22:10

that

play22:11

or there can be other

play22:13

settings

play22:14

like the ip forwarding for example in

play22:16

our line xbox you may want to disable it

play22:19

for

play22:20

security reasons and these are

play22:22

hundreds of such controls that you that

play22:25

you may want to apply in order to

play22:28

eliminate the the risks that are

play22:30

discovered apart from rolling out the

play22:32

software batches alone so it's important

play22:34

to have the

play22:36

the ability to not just apply the

play22:39

software patches but also having

play22:41

additional controls that you want to

play22:42

roll out to eliminate the

play22:45

vulnerabilities that are identified

play22:48

once you have remediated these

play22:50

vulnerabilities it is about reporting

play22:53

understanding and get having that

play22:55

confidence that i've actually fixed all

play22:57

the vulnerabilities

play22:58

and some of these

play23:00

findings you may want to feed into

play23:03

external system as well

play23:05

maybe a

play23:06

same product wants to know what

play23:08

vulnerabilities are discovered in the

play23:10

environment

play23:11

and at times it it's also critical to

play23:14

have some

play23:15

sort of an alert mechanism to know if

play23:18

there are high critical vulnerabilities

play23:19

that are discovered within the

play23:21

environment i want to get an instant

play23:24

alert so i can act upon those

play23:27

those vulnerabilities

play23:29

on priority

play23:34

now

play23:34

most important of all of these is being

play23:37

able to automate each of these

play23:41

bring in the automation that is

play23:43

necessary at each of these control

play23:45

each of these layers

play23:48

being able to run

play23:49

vulnerability scan automatically every

play23:52

day being able to roll out the security

play23:54

controls in case there is a drift every

play23:57

day

play23:58

and being able to apply uh security

play24:01

patches critical security answers at

play24:03

least on an automated basis to some of

play24:06

the eit environment

play24:08

so these are the automations that that

play24:10

i'm talking about

play24:12

there are significant number of

play24:14

activities within the vulnerability

play24:16

management space that can be automated

play24:18

into

play24:19

a routine

play24:21

so if you were to look at that diagram

play24:23

once again

play24:27

so all of these layers coming together

play24:30

on a single console

play24:32

talking to each other

play24:34

being able to make those decision or

play24:36

help us make those decisions

play24:39

and being able to automate this entire

play24:41

process is what we call an advanced

play24:44

vulnerability management so at the

play24:46

visibility layer you have continuous

play24:48

visibility identification there you have

play24:52

discovered vulnerabilities

play24:53

misconfiguration missing security

play24:55

patches and other security risk

play24:57

exposures

play24:58

the assessment and prioritization layer

play25:02

we have

play25:03

understood the risks

play25:05

and we have come up with a remediation

play25:08

strategy by prioritizing what are those

play25:10

vulnerabilities that you want to act

play25:12

upon

play25:13

and we've also fed in additional

play25:15

external

play25:16

data feeds to help us prioritize those

play25:19

vulnerabilities

play25:20

maybe

play25:21

a particular vulnerability is being

play25:23

exploited in the wild there's an exploit

play25:25

kit that is

play25:27

making use of a particular vulnerability

play25:30

and

play25:31

so and the attacker perspective itself

play25:33

so all of this information will help us

play25:35

prioritize this vulnerability in order

play25:38

to remediate at the remediation layer

play25:40

it's about application of the the

play25:42

security patches but also makes

play25:45

fixing the misconfigurations

play25:47

and applying security controls that go

play25:49

beyond

play25:51

patching alone and finally

play25:53

being able to report on all of these

play25:56

vulnerabilities that are discovered and

play25:58

the mitigations that you have wrote down

play26:01

and then the

play26:03

key

play26:04

part of this is being able to unify them

play26:08

into a centralized management console

play26:10

and having one console to manage the

play26:12

entire program so this is what is

play26:15

one advanced vulnerability management

play26:20

so moving on

play26:26

so what are the benefits that we get out

play26:28

of

play26:29

implementing such a program obviously

play26:31

the the security effectiveness has

play26:34

increased

play26:35

because you're able to automate a good

play26:37

number of these process and you're able

play26:39

to

play26:40

know the risks every day and you're

play26:42

having the controls to

play26:45

eliminate those risks

play26:47

essentially managing the attack surface

play26:50

effectively and

play26:53

we also have the advantage of being

play26:55

audit ready at all time because we are

play26:57

able to achieve that continuous

play26:58

compliance to either industry security

play27:01

benchmarks like the pci and hipaa etc

play27:04

but also technical security controls

play27:07

from nest and cis and stig and all of

play27:10

these security controls you you will

play27:12

have that sense that you are able to

play27:14

achieve that

play27:15

continuous compliance to any of these

play27:18

guidelines so at any point in time we

play27:20

will be able to demonstrate compliance

play27:23

to the auditors

play27:25

and

play27:26

we have the integrated console where you

play27:30

have visibility to

play27:32

vulnerabilities and misconfigurations

play27:34

and id

play27:35

security exposures

play27:37

that go beyond these vulnerabilities so

play27:39

you have one view where you get to know

play27:42

all the risks that that the iit

play27:44

environment is exposed to

play27:47

and there is an integrated remediation

play27:49

controls that i can roll out from within

play27:51

the same console depending on the type

play27:54

of vulnerability that is discovered if

play27:56

it is a software over nobody vendor has

play27:58

released a patch already go ahead and

play28:00

roll out the patch and i see there is an

play28:03

unauthorized application installed in

play28:05

one of the system go ahead and

play28:08

uninstall that particular application or

play28:10

blacklist that particular application

play28:12

maybe there are certain devices that are

play28:14

connected to the network which

play28:16

should not be

play28:18

black

play28:19

block access to those

play28:21

devices

play28:22

so all of these controls are available

play28:25

within the same console now

play28:28

to apply and as soon as i apply those

play28:32

mitigation we will have that

play28:37

sense of having applied those mitigation

play28:39

because the vulnerabilities are

play28:41

eliminated within the same

play28:45

process within the same console you have

play28:47

the visibility to know if effectively

play28:50

that particular vulnerability is fixed

play28:51

or not

play28:53

and beyond all this we will be able to

play28:55

achieve that resource efficiency you

play28:58

don't have to operate in multiple

play29:01

consoles and

play29:04

more number of people required to

play29:06

operate on each of them

play29:08

and

play29:09

reduce the cost of

play29:11

ownership

play29:12

of implementing such a program within

play29:14

the within your environment

play29:23

so

play29:24

with

play29:25

the implementation of advanced

play29:27

vulnerability management what we get is

play29:29

certainty

play29:30

knowing that i have uncovered all

play29:32

possible risks

play29:34

control

play29:36

having implemented the remediation

play29:38

measures

play29:40

within the same console and having

play29:42

eliminated those vulnerabilities that

play29:44

were discovered

play29:45

and continuity because you automated

play29:48

significant number of these process into

play29:50

a daily routine

play29:53

majority of these are running

play29:56

on their own and you still have the

play29:58

visibility and control that you would

play30:00

want to within that centralized console

play30:02

that you're talking

play30:08

so secbod is pioneering this journey

play30:12

reinventing the vulnerability management

play30:15

through our senarno platform cyber

play30:17

hygiene platform

play30:19

it makes it into a continuous and

play30:21

automated process

play30:25

it brings together multiple tools into

play30:28

one single console by unifying all the

play30:31

use cases that you know all the the

play30:34

layers that we talked about into one

play30:36

single console

play30:38

from discovering the vulnerabilities

play30:40

misconfigurations asset exposures

play30:43

and other security controls deviations

play30:46

but also having the tool set to roll out

play30:49

the security patches and security

play30:51

controls that go beyond patching

play30:54

all of these are coming together into

play30:56

one single console supported by one

play30:59

single agent

play31:01

and having real-time communication

play31:04

with these agents to discover the

play31:07

problem and also having

play31:09

opportunity to respond to those

play31:12

uncovered problems within the same

play31:14

console in real time

play31:16

and

play31:19

saner now platform works

play31:21

with

play31:23

multiple

play31:24

types of devices that are typically

play31:26

present from windows operating system to

play31:29

linux and mac os but also on virtual

play31:32

devices and network

play31:33

infrastructures that are typically

play31:37

present within the environment

play31:39

and we have the

play31:43

security checks to discover the

play31:46

vulnerabilities and misconfigurations

play31:48

and all types of security risks within

play31:50

the environment supported by our

play31:53

repository of security checks that we

play31:55

are building in-house but also having or

play31:59

enriching this discovery by feeding in

play32:01

additional threat intelligence to help

play32:03

prioritize those vulnerabilities and

play32:05

and

play32:09

coming up with a risk mitigation program

play32:12

that can be effectively implemented

play32:15

and cno now as a platform is available

play32:18

uh

play32:19

as a sas deployment

play32:21

but also as an on-premise

play32:24

deployment

play32:25

if

play32:26

any of our customers are interested in

play32:28

non-premise deployment

play32:30

so sena now vm is the vulnerability

play32:33

management module runs a scan every day

play32:35

scans typically take about five minutes

play32:37

to complete

play32:39

cm is the configuration

play32:42

management or system hardening module it

play32:44

identifies the configuration address

play32:47

drifts with

play32:49

within the operating systems and the

play32:51

applications and servers and network

play32:53

infrastructure but it also has the

play32:55

ability to mitigate those configuration

play32:59

drifts within the environment and you

play33:02

can set it into an automated process

play33:04

where anything

play33:06

becomes a deviation you have the

play33:08

automated control that you can apply to

play33:10

bring back the device into a compliant

play33:12

posture

play33:13

see now pm is the patch management

play33:15

module

play33:16

helps

play33:17

patch operating system from microsoft

play33:20

windows to linux and mac os but apart

play33:23

from that large list of third-party

play33:25

applications can also be

play33:27

patched

play33:28

within the same console

play33:30

asset exposure module discovers

play33:33

the idea set provides real-time

play33:35

visibility into the computing

play33:37

infrastructure

play33:39

but also identifies risks

play33:42

from shadow i.t to unauthorized

play33:44

applications to unwanted

play33:46

soft presence of unwanted software

play33:49

etc

play33:50

then the endpoint management module

play33:52

provides

play33:53

further granular visibility into the

play33:55

endpoint devices knowing who was logged

play33:58

in what services and ports are

play34:01

open

play34:03

is your antivirus or anti-malware

play34:05

product running effectively and we have

play34:08

hundreds of such checks that can be

play34:09

monitored in real time to discover the

play34:12

security controls deviations

play34:15

but also has integrated remediation to

play34:17

fix these deviations

play34:19

so all these tools are coming together

play34:22

within the single console

play34:25

and giving that visibility that we need

play34:27

and the control that we need in order to

play34:29

implement

play34:31

effective

play34:32

advanced vulnerability management

play34:34

program

play34:39

with that i conclude my part

play34:42

over to you jackson

play34:47

fantastic that was uh

play34:49

amazing uh chandra i got to learn uh

play34:51

something new uh definitely i'm sure

play34:54

everybody would have found uh some value

play34:57

from this session

play34:58

so

play34:59

uh regarding qna we do have uh

play35:03

so we'll take five minutes from uh your

play35:06

uh

play35:07

of yours uh chandra to answer a few

play35:09

questions that our audience has and

play35:11

we're just gonna going to read out them

play35:13

for you and

play35:15

can take them from there

play35:17

sure um

play35:18

so

play35:19

first

play35:21

have you ever had this question how's

play35:22

your how is your solution different from

play35:25

qualis

play35:28

all right it's a good question so

play35:31

collis is a vulnerability management

play35:33

product

play35:34

and uh cnn is also a vulnerability

play35:38

management product and

play35:40

as we discussed in in our session what

play35:43

we're trying to do is bring all of these

play35:46

use cases

play35:48

into one single console from

play35:49

vulnerability detection to

play35:51

misconfiguration detection to asset

play35:53

exposure and poster anomaly detection

play35:56

and security controls deviation

play35:58

detection

play35:59

into one single console

play36:01

but having an integrated mitigation

play36:03

capability as well not just with the

play36:05

patch management but additional

play36:08

security controls that can be applied to

play36:11

eliminate these vulnerabilities that are

play36:13

discovered

play36:14

and we make it into a continuous process

play36:17

where the scans are running every day

play36:19

and you have the visibility into the

play36:21

risks but also having the controls to

play36:24

deploy to eliminate those risks and that

play36:27

is the the significant difference

play36:29

between

play36:31

vulnerability management vendors that

play36:33

are out there including callers and say

play36:35

in a non-cyber hygiene platform

play36:40

perfect

play36:41

uh the second

play36:43

question

play36:44

uh i would like to know if it is

play36:46

possible to share the presentation with

play36:48

us and have a short meeting with the pdf

play36:50

thanks definitely i will reach out to

play36:53

you i will set up a separate session um

play36:56

a product demonstration as well as will

play36:58

share this presentation also

play37:01

another question

play37:03

uh for you chandra would be do you have

play37:05

an on-prem uh on premise installation

play37:08

how can i get an installation package

play37:12

all right yes we do have an on-premise

play37:14

installation uh depending on the the

play37:17

environment and the deployment method we

play37:19

would be able to deliver the

play37:21

installation packages

play37:23

so typically we have an

play37:26

all bundled product that can just be

play37:28

deployed on a vm

play37:30

for example or if someone is looking to

play37:32

host it on a cloud environment from aws

play37:35

as your gcp would be able to

play37:38

deliver those as well depending on the

play37:40

scale that you're looking at

play37:42

so yes so you can talk to us tell us

play37:45

what is the deployment method that

play37:47

you're looking at and

play37:48

we will understand that and provide

play37:52

the deployment package or the

play37:53

installation package accordingly and

play37:55

we'll work with you to install those as

play37:57

well

play38:00

okay amazing

play38:02

next question we have is what makes this

play38:05

platform different from a seam solution

play38:09

okay

play38:10

it's a good

play38:12

question again so same typically is for

play38:15

this

play38:16

operating in the detection and response

play38:19

layer and we are operating in the

play38:21

prevention layer

play38:23

which is about managing the attack

play38:25

surface eliminating the

play38:27

potential weaknesses that could be

play38:29

exploited by the attacker before an

play38:31

attacker could exploit them

play38:34

whereas the same products would want to

play38:36

detect a potential

play38:39

exploit itself or an unwanted activity

play38:42

that is taking place you want to detect

play38:44

that and respond to that particular

play38:47

incident

play38:48

so it is

play38:51

vm or vulnerability management and

play38:54

security information event management

play38:56

are operating in two different layers

play38:59

but

play39:00

we can't feed our detection into the the

play39:04

same product so that that will enrich

play39:06

the same product to

play39:08

to detect a potential problem

play39:10

much better so that is the integration

play39:15

that can be done between the vm and the

play39:17

same product

play39:20

okay perfect hope we answered that for

play39:23

you

play39:24

another question for you chandra is

play39:26

how do you help in identifying

play39:28

vulnerability on ot environment

play39:33

yes so ot environment these days i mean

play39:37

most of these devices are connected to

play39:40

the

play39:41

computing environment so

play39:43

we do have customers who have deployed

play39:47

within the ot environment as well

play39:49

so we do discover those vulnerabilities

play39:52

and we do have medications that can be

play39:57

applied in those environment as well

play39:59

and one of the requirement that comes up

play40:02

quite often

play40:04

as a deployment method in the ot

play40:06

environment is can it operate in a

play40:08

an isolated manner where it doesn't have

play40:11

connectivity to the internet

play40:14

so that is one another deployment method

play40:16

that we have taken

play40:17

yes it can work in those isolated

play40:19

environments as

play40:22

well okay

play40:25

uh

play40:26

next question

play40:27

we have is another vulnerability

play40:29

management program is tenable

play40:32

what's new feature uh

play40:34

in sena now vmp versus sustainable vmp

play40:39

i'm imagining vmp would yeah we have

play40:41

vulnerability management limiting

play40:42

management program yes

play40:45

all right so tenable um

play40:48

ss good at discovering the

play40:50

vulnerabilities and there is no

play40:52

integrated remediation that we are

play40:54

talking about there is no

play40:57

natively

play40:58

patch management tool

play41:00

and other security controls deviations

play41:03

that we just discussed

play41:05

during the course of our session so

play41:07

that's a significant difference between

play41:09

a 10 ml's world liberty management

play41:12

program versus sac board where you have

play41:14

the

play41:16

visibility on a day-to-day basis to the

play41:19

risks that are there within the

play41:21

environment but also have that

play41:22

integrated remediation controls that you

play41:24

can apply and achieve the

play41:28

security effectiveness that you're

play41:30

looking for

play41:34

okay uh my next question is hi team it's

play41:39

not i don't think it's a question well

play41:41

hi team joined in late in discussion can

play41:43

i have a recorded session of this

play41:44

discussion please i missed the entire

play41:46

session yes definitely

play41:48

we are going to send a recorded version

play41:50

of this webinar to your email

play41:53

so you can watch it share with your team

play41:55

as well as we will have a recorded

play41:57

version of this

play41:59

webinar available on our website on our

play42:01

youtube channel as well as another

play42:03

bright talk channel

play42:05

so

play42:05

we our team will definitely reach out to

play42:08

you

play42:08

uh next question uh chandler for you is

play42:12

how relevant would be threatened

play42:13

intelligence in a vulnerability

play42:15

management platform

play42:20

yeah so

play42:22

there are multiple parameters that we

play42:24

consider so the

play42:26

threat intelligence or the vulnerability

play42:28

intelligence is something that stackpot

play42:30

we've been working on for the last

play42:34

10 plus years building

play42:36

an scap compliant

play42:38

vulnerability intelligence database and

play42:42

this world's largest database

play42:44

it's also being used by some of the

play42:46

other vendors in the cyber security

play42:49

industry as well which is the same

play42:51

intelligence that we use within our

play42:53

platform

play42:55

and

play42:56

not just vulnerability software

play42:59

vulnerability discovery but also we have

play43:01

a

play43:02

greater coverage as well as detecting

play43:04

the misconfigurations and other

play43:05

additional

play43:08

security risks that

play43:10

can be present within the environment so

play43:12

that way it is going beyond the the

play43:15

detection of the software

play43:16

vulnerabilities alone but also

play43:19

having the detection mechanisms

play43:22

to find additional

play43:24

types of vulnerabilities

play43:26

and it is updated every day

play43:29

this is something that we have around

play43:31

the clock security research team which

play43:33

is working identifying the

play43:36

researching on those vulnerabilities and

play43:39

adding the modules detect needed to to

play43:42

detect those vulnerabilities timely

play43:45

and

play43:46

the same thing also helps identify

play43:50

you know mitigation that can be applied

play43:53

to different kinds of vulnerabilities

play43:56

and it is continuously updated

play43:59

okay fantastic

play44:01

the next question i believe we answered

play44:03

part of the question

play44:05

but this question is again on ot can the

play44:08

system be used in an ot system that is

play44:10

offline

play44:12

yes yeah which is the requirement that i

play44:15

was referring to where it needs to be an

play44:17

offline environment no connectivity to

play44:19

the internet

play44:21

and you still be able to do that yes we

play44:23

do have such deployment method as well

play44:27

where it works in such an isolated

play44:29

environment

play44:32

okay

play44:34

is this for free uh to get an

play44:37

installation package for on-prem just

play44:39

for trial period how long is the trial

play44:41

period

play44:44

we do have the the trial available on

play44:46

our cloud platforms has hosted solution

play44:51

typically we don't have we don't provide

play44:54

the on-premise deployment as a trial

play44:57

but the capabilities of both these

play44:59

deployments are

play45:01

equally

play45:02

same as well as the features and

play45:04

capabilities are concerned

play45:06

so it is pretty easy to onboard on our

play45:09

cloud hosted platform sign up deployed

play45:12

on 10 devices any kind of devices

play45:15

windows linux or mac

play45:18

and

play45:19

all of the capabilities are available

play45:21

for a month period to try out the

play45:22

product

play45:26

yeah and you can go to our website

play45:29

www.seqbot.com and request a trial or go

play45:32

to xenon.com and request a trial

play45:34

and the team can help you evaluate the

play45:37

solution for your use cases

play45:39

next question for you

play45:41

is are there any built-in compliance

play45:43

templates such as for hipaa could i get

play45:46

a report indicating their assets are

play45:47

compliant which assets are compliant or

play45:50

not

play45:51

yes

play45:52

yeah so we do have uh

play45:54

templates especially for the

play45:56

configuration hardening the system

play45:57

hardening use cases

play45:59

from nist templates to mappings to cs

play46:02

and pc and hipaa et cetera

play46:05

but if you look at the guidelines from

play46:07

pcr hipaa cyber security framework

play46:10

it goes beyond the system hardening use

play46:12

case alone so we have the reports that

play46:15

can be generated to

play46:19

prove compliance to any of these

play46:22

guidelines

play46:24

so such reports can be built and we can

play46:26

export those reports

play46:28

to demonstrate that compliance

play46:32

okay

play46:33

uh another question is how sena now

play46:35

prioritize

play46:37

the vulnerabilities is that based on

play46:39

only cvss core or it's considering any

play46:42

other parameters

play46:44

it does use cvss core but it also goes

play46:47

beyond the cvss

play46:49

from the threat intelligence feed that

play46:51

we

play46:52

ingest into our platform

play46:54

it will help identify

play46:56

those vulnerabilities that are being

play46:58

exploited in the wild are being used by

play47:01

ransomware and malware

play47:03

as an entry point so all of those are

play47:05

highlighted and prioritized so

play47:08

one would have the ability to roll out

play47:10

the security batches and security

play47:12

controls

play47:13

timely for such vulnerabilities

play47:16

we also have a security alert

play47:18

mechanism that our research team sends

play47:21

out

play47:23

frequently to all our customers to to

play47:25

help them

play47:27

understand the vulnerability understand

play47:29

the impact of that vulnerability and

play47:30

then mitigate or roll out the mitigation

play47:32

within the same console so

play47:35

multiples of these are being used within

play47:37

within siena now to prioritize

play47:40

vulnerabilities

play47:44

okay

play47:46

and i think this is a follow-up question

play47:49

uh curious on how it will communicate or

play47:52

report on the vulnerability for those

play47:54

out of band objects

play47:57

uh i think this this is for

play48:03

not sure i fully understood the

play48:05

question yeah i think this is this is

play48:08

this is a follow-up to

play48:09

uh uh what is what makes this platform

play48:12

different from a sim solution

play48:14

so the question is curious on how it

play48:16

will communicate or report on the

play48:18

vulnerability for

play48:19

those out of band objects

play48:28

i think we can

play48:29

probably need a little more information

play48:32

on this question yeah yeah so we can uh

play48:35

connect with uh

play48:38

okay i think we can offline offline and

play48:40

then yeah yeah

play48:42

then there's uh how does licensing work

play48:44

do you integrate with cmdb solutions

play48:49

licensing is

play48:50

typically based on the number of devices

play48:53

that you have within your environment

play48:55

network discoverable devices and the the

play48:58

endpoints and

play49:00

workstations and servers

play49:03

and

play49:04

we do have a monthly

play49:06

subscription module model as well as an

play49:08

annual subscription model available

play49:11

and the six tools that we talked about

play49:15

based on

play49:17

your need or prioritized need you will

play49:20

be having the ability to enable those

play49:22

modules

play49:23

and not pay for the other modules that

play49:26

you either

play49:27

or not

play49:28

prioritize the prioritizing that or you

play49:31

may have already invested in another

play49:32

solution

play49:35

so we have the flexibility of enabling

play49:38

the request requisite modules and the

play49:41

number of devices that our software is

play49:43

installed on

play49:46

okay

play49:48

i just wanted to make sure

play49:49

i

play49:50

sorry go ahead

play49:53

no no please go ahead

play49:54

yeah so i just want to make sure

play49:56

i get a uh

play49:58

an idea of your time we have been

play50:00

keeping you for long i have a couple of

play50:02

other questions from the audience uh

play50:05

would you

play50:06

take up two other questions and then we

play50:08

can wrap up and all other yes uh

play50:11

i think we can we can still do that yeah

play50:13

okay do you have something

play50:15

okay

play50:16

so two questions uh one one of them is

play50:19

are azure and other cloud ias

play50:22

assets covered

play50:24

yes so the workload

play50:27

whether it's running on azure or aws or

play50:30

gcp we would be able to

play50:32

uh

play50:34

cover those as well

play50:36

all the capabilities that we talked

play50:37

about

play50:38

will be available for those

play50:40

assets

play50:43

okay and i think a final question for

play50:45

today the vmp platform has a dynamic

play50:48

mitigation remediation for assets in the

play50:50

cloud

play50:52

is that right let's say to discover

play50:54

vulnerabilities with configuration in

play50:56

the cloud and remediation solution

play50:59

yes

play51:02

yes we do have the the mitigations

play51:04

available for all the assets that are in

play51:06

the cloud once again i would like to

play51:08

stress upon this point which is the

play51:11

workload i said

play51:13

we will be able to identify

play51:15

vulnerabilities and misconfigurations in

play51:17

those

play51:20

environment and having the remediation

play51:23

capabilities also available to mitigate

play51:25

those risks

play51:28

okay perfect thanks thanks a lot chandra

play51:32

and we do have a couple of other

play51:35

questions left but

play51:36

what we're going to do is reach out to

play51:39

um

play51:41

all of our viewers individually and

play51:43

answer them

play51:44

um separately

play51:46

thanks for all your questions it was

play51:48

really an um interacting

play51:51

q a session

play51:52

uh for

play51:54

those of you uh who had the question

play51:56

whether you will get a recording yes we

play51:58

will send a recording do you email and

play52:01

before i close uh chandra i want to

play52:03

thank you

play52:04

for giving us your time and

play52:08

talking about the subject to our

play52:10

audience

play52:11

thank you jackson thank you everyone for

play52:14

being part of the session it's really

play52:16

good to

play52:17

receive all those questions happy to

play52:20

answer hopefully

play52:22

to your satisfaction

play52:24

perfect

play52:25

uh with that

play52:27

we are

play52:28

about to end this session so i just like

play52:31

to

play52:32

make sure i convey

play52:33

sequel cinema cyber hygiene platform is

play52:36

an advanced vulnerability management

play52:38

solution id security teams use it to

play52:41

discover vulnerabilities install patches

play52:43

comply with regulatory standards you get

play52:46

asset exposure implement security

play52:48

controls beyond

play52:49

catching and a lot more you can get a

play52:51

free trial going to our website www.com

play52:56

uh once again we will have a recording

play52:59

session a recorded session uh available

play53:01

on brighttalk and youtube channel we'll

play53:03

also send you an email with exact urls

play53:07

uh to the recording as well as the

play53:09

presentation that chandra used today

play53:11

please keep tuned to segbot webcast

play53:14

we'll see you on our next session thanks

play53:16

for your valuable time

play53:17

we wish you a happy time ahead thank you

play53:34

you

Rate This
★
★
★
★
★

5.0 / 5 (0 votes)

Étiquettes Connexes
CybersecurityVulnerability ManagementEnterprise ITWebcastSecurity TeamsPrevention LayerThreat IntelligenceAutomationComplianceCyber Hygiene
Besoin d'un résumé en anglais ?