Request a Demo
Welcome to the Cygilant Blog

Building an IT Infrastructure That Works for 2014

Posted by Vijay Basani on Jan 15, 2014

The year ahead looks ominous as the frequency and severity of high profile data breaches continues to accelerate.  We’ve given our IT security predictions and resolutions the one common theme is the importance of building an infrastructure to overcome procurement, deployment and operational challenges associated with traditional security management tools.  We see automation as an increasingly critical component of this infrastructure as resource-constrained organizations will be even more challenged to address security management and operational complexities. 

It is critical that organizations have the tools in place to quickly identify and act on unauthorized network activity, and continuously diagnose and protect the nodes that are most vulnerable to an attack. 

Vulnerability analysis, data discovery and  management are now par for the course and there are a number of leading vulnerability analysis solutions that require collection and analysis of data – which then requires comprehensive reporting and analysis –  in order to glean the benefits of  Controls such as SANS. Likewise the realm of discovery and analysis  is the detection of IT assets on a corporate network must be categorized as authorized or unauthorized nodes on a network. 

 To help manage these essential tasks, EiQ kicked off the new year by offering two free and easy-to-deploy continuous security intelligence tools: VulnerabilityVue™, a vulnerability analysis solution, and DiscoveryVue™, an asset discovery and management solution. 

VulnerabilityVue centralizes vulnerability scan data from leading vulnerability scanners (Nessus, Qualys or Rapid 7) into a single console for easy analysis, reporting and monitoring so they can easily identify vulnerable systems and obtain appropriate remediation guidance.   It help organizations quickly assess vulnerable systems as recommended by the SANS institute. DiscoveryVue uses NMAP to discover and inventory devices operating on an organization’s network. It has the ability to create asset policies and continually monitor compliance against defined policy. In addition, users can easily identify authorized and unauthorized devices on their network as recommended by the SANS Institute.

These two freemium products will help to advance continuous security intelligence, essential for cyber security and compliance by automating both vulnerability collection and analysis, and asset discovery and management so that companies can better identify and react to threats and security gaps before they are exploited by hackers.

Tags: Security Monitoring, Vulnerabilities, Compliance, Security Analysis

Subscribe to Email Updates

Experience how Cygilant SOCVue and 24x7 GSOC Team can help detect threats, prioritize vulnerabilities and apply patches.

Request a Demo

Most Recent Posts

Posts by Topic

See All