Outpost24 CORE advancement delivers complete visibility of technology assets and threat exposure

Outpost24 has made significant updates to its offering with the release of Threat Explorer, an advanced vulnerability intelligence and custom alerting tool for continuous threat monitoring. The new module, available as a part of the Threat Compass threat intelligence solution, provides a timely source of vulnerability intelligence, enabling organizations to be alerted on the latest vulnerability exploits and prioritize remediation.

Key features in Outpost24 Threat Explorer

With Threat Explorer, organizations can see and manage where they are most vulnerable and prioritize remediation or scan based on risk context and specific systems affecting them. It provides security teams with high fidelity vulnerability intelligence into potential threats and the confidence to make informed remediation decisions:

  • Real-time notifications about newly published CVEs affecting your systems (CPE correlation)
  • Automatic detection of critical threats for targeted vulnerability scanning
  • Remediation prioritization using risk-based scoring by combining CVSS with exploit availability

Commenting on the announcement Brendan Hogan, Chief Strategy Officer at Outpost24, said, “Threat Explorer correlates CVEs with affected technologies and systems (CPE), giving customers access to unprecedented insights into vulnerabilities impacting their organizations, with risk-based scoring to comprehend and mitigate the risks they face. Hogan continues, “The Threat Explorer module is a great complement to our cyber threat intelligence solution by providing custom alerting and reporting of system weaknesses that could later become vulnerabilities. Organizations are empowered to proactively counter risks and reduce the window of exposure before they can be exploited.”

The post Outpost24 CORE advancement delivers complete visibility of technology assets and threat exposure first appeared on IT Security Guru.

The post Outpost24 CORE advancement delivers complete visibility of technology assets and threat exposure appeared first on IT Security Guru.