7.2 C
New York
Thursday, December 19, 2024

Enhanced Cybersecurity with Cisco Safe Endpoint and Vulnerability Administration


Organizations today face the daunting problem of successfully prioritizing and responding to safety dangers and incidents. The mix of Cisco Safe Endpoint and Cisco Vulnerability Administration type a strong automated answer, enabling you to detect, prioritize and handle endpoint vulnerabilities, starting with essentially the most extreme ones. There are two integrations out there to assist handle vital elements of safety, each pre- and post-incident, which not solely improve incident response, but additionally fortify preventative measures.

Publish-Incident: Accelerated Response with Threat-Based mostly Context

The primary integration focuses on managing safety incidents post-occurrence with risk-based context. On the coronary heart of this integration is the Cisco Safety Threat Rating, powered by Cisco Vulnerability Administration. It leverages the group’s endpoint information and telemetry, enriched with vulnerability menace intelligence, and is analyzed by superior information science algorithms like machine studying and predictive modeling. The result? A quantifiable, granular threat rating for each vulnerability, aiding in prioritizing and addressing essentially the most vital points straight from the Safe Endpoint Console. The Cisco Safety Threat Rating is prominently displayed within the Safe Endpoint UI, offering scanner-less visibility into vulnerabilities in key working techniques.

Customers of Cisco Safe Endpoint Benefit or Premier will routinely acquire entry to the Cisco Safety Threat Rating for every CVE on managed endpoints; permitting them to leverage real-world menace intelligence as a part of their incident investigation. By integrating the Cisco Safety Threat Rating into the Safe Endpoint Console, SOC analysts will simply be capable to determine the riskiest endpoints of their setting and drill down to grasp the vulnerabilities which are driving that threat. As soon as the riskiest endpoints are recognized, you’ll be capable to speed up your incident response by prioritizing motion on essentially the most vital vulnerabilities.

Determine 1: Viewing the Threat Rating inside the Safe Endpoint UI
Determine 2: Viewing endpoint vulnerabilities within the Safe Endpoint UI

Pre-Incident: A Holistic Threat-Based mostly Method

Shifting to a extra proactive stance, our new integration between Cisco Safe Endpoint and Cisco Vulnerability Administration extends past a Safety Operations use case to permit IT Operations and vulnerability administration analysts to realize entry to a risk-based vulnerability administration platform. This integration permits customers of each options to detect endpoint vulnerabilities and prioritize these posing essentially the most threat for environment friendly remediation. With Cisco Safe Endpoint, customers can hunt for hidden threats, detect stealthy malware, and carry out superior investigations with international menace intelligence from Cisco Talos. Cisco Vulnerability Administration can then ingest the Cisco Safe Endpoint information, leveraging a devoted information connector, and prioritize the vulnerabilities primarily based on real-world attacker exercise and enterprise context. This permits organizations to considerably scale back their threat publicity with out rising their useful resource funding in remediation capability.

Determine 3: The Cisco Safe Endpoint connector possibility proven within the Add Connector UI for Cisco Vulnerability Administration

The mixing of those two options permits customers to totally embrace a risk-based strategy to endpoint vulnerability administration. This integration unlocks a number of key use instances corresponding to:

  • Detecting and understanding vulnerabilities on endpoints,
  • Centralizing vulnerability information from Cisco Safe Endpoint and different safety information sources by 50+ out there information connectors,
  • Prioritizing vulnerabilities primarily based on exploitation threat and asset context,
  • Implementing remediation workflows and enabling IT to self-serve to effectively scale back threat,
  • Measuring and reporting on threat posture, business benchmarks, and progress made.
  • Remediation Analytics & Scoring, Zero-Day intelligence powered by Cisco Talos, and Vulnerability Intelligence API and UI with the Cisco Vulnerability Administration Premier tier

The mixing of those two options takes vulnerability administration to a brand new degree, offering a complete, risk-based strategy to cybersecurity.

Determine 4: The Cisco Vulnerability Administration UI displaying vulnerabilities

See It in Motion

The mixing of Cisco Safe Endpoint and Cisco Vulnerability Administration is greater than only a answer on paper – it’s a sensible, real-world instrument that may improve your cybersecurity measures. Don’t simply take our phrase for it, see it for your self. We’ve created a recorded demo showcasing the mixed energy of those two merchandise.

To study extra about how Cisco Vulnerability Administration can improve your group’s cybersecurity efforts, go to https://www.cisco.com/web site/us/en/merchandise/safety/vulnerability-management/index.html


We’d love to listen to what you assume. Ask a Query, Remark Under, and Keep Related with Cisco Safety on social!

Cisco Safety Social Channels

Instagram
Fb
Twitter
LinkedIn

Share:



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles