
Authorities publish over 1500 new vulnerabilities every month Cyberwatch Vulnerability Manager helps you to manage your vulnerabilities, and provides a global and continuous overview of your vulnerabilities with detection, prioritization, and remediation.
Vendor
Cyberwatch
Company Website


A complete Vulnerability Management platform, from detection to remediation
Authorities publish over 1500 new vulnerabilities every month Cyberwatch Vulnerability Manager helps you to manage your vulnerabilities, and provides a global and continuous overview of your vulnerabilities with detection, prioritization, and remediation.
Access a comprehensive database on CVEs and their attack kits, and identify the most dangerous vulnerabilities Have a knowledge base on vulnerabilities, in your infrastructure or hosted in SaaS mode. Prioritize risks and receive only relevant information. Identify the easiest vulnerabilities to attack and the most impacting for your information system.
- **Rich vulnerability database: **Access a complete encyclopedia on CVEs, to help you perform relevant analyzes, directly embedded in our platform.
- **Encyclopedia updated every hour: **Obtain up-to-date information on vulnerabilities and their metadata (alerts from authorities, publishers’ bulletins, exploits, etc.), thanks to our knowledge base which is automatically refreshed every hour.
- **Vulnerabilities sorted and classified according to your business needs: **Use our search engine to do your analyzes by technology, by level of exploitability, or by severity.
- **Automatic prioritization with cyberscore: **Automatically identify your real risk with our Cyberscore. It is calculated from the exploitability of vulnerabilities and your business context, based on the environmental and temporal metrics of CVSSv3.
Features
- **Map: **Get the full and contextualized list of the vulnerabilities that affect the technologies and assets of your IT infrastructure.
- **Detect: **Monitor continuously the vulnerabilities published by authorities (CERT-FR, NVD…) that are linked to your IT infrastructure.
- **Identify: **Specify your business requirements for each asset, by choosing your Availability, Integrity, and Confidentiality goals.
- **Prioritize: **Review automatically your vulnerabilities based on their CVSS score, exploitability, and your business requirements.
- **Decide: **Make the right decisions using customizable dashboards, and act quickly with simple recommendations available in our software.
- **Fix: **Deploy easily security patches from our native Patch Management module, while respecting your existing infrastructure (WSUS / Red Hat Satellite …).