Vulnerability Management

Add Network Context to your Vulnerability Management Platform to Identify Scan Coverage Gaps and Prioritize Vulnerabilities

Vulnerability Management Topology Map

RedSeal’s network modeling and risk scoring platform can improve your vulnerability management program at each step of the process.

By adding network context into your enterprise network vulnerability management program, RedSeal enables you to perform a true risk-based vulnerability prioritization of the findings from your existing scanners. And, by comparing your scan data with a continuously updated RedSeal model of your network, RedSeal helps identify which assets to target for scanning, and helps identify and resolve any gaps in your vulnerability scanner coverage. RedSeal’s cyber vulnerability assessment calculates vulnerability risk scores that take into account not only vulnerability severity and asset value, but also downstream risk based on the accessibility of vulnerable downstream assets. As a result, network vulnerability managers are able to identify and target the vulnerabilities that are creating the most risk in your unique environment.

With RedSeal as part of your enterprise vulnerability management program, you’ll be able to:

  • Identify assets that have not been scanned by a vulnerability tracking tool.
  • Identify the network devices and specific access rules preventing scanner access.
  • Prioritize vulnerabilities for remediation or mitigation based on risk — risk-based vulnerability is calculated in the context of your network, business, and vulnerability management best practices.
  • Visualize all reachable assets for optimal scanner placement.
  • Efficiently triage and plan mitigation of unpatchable vulnerabilities through containment or isolation.

RedSeal adds value to each phase of a vulnerability management program: discovery, assessment, triage, and vulnerability remediation and mitigation.

  • Discover assets: Generate scanner target lists and identify assets that have not been scanned.
  • Perform cyber vulnerability assessment: Identify network devices and configuration rules preventing scanner access. Visualize all reachable assets for optimal scanner placement.
  • Triage findings: Perform risk-based vulnerability prioritization based on your network context, taking into account severity, asset value, as well as upstream and downstream access.
  • Remediate and mitigate issues: Identify precise access paths and devices to update in order to isolate and contain vulnerable assets that can’t be patched.


Operationalizing RedSeal for Vulnerability Management

Learn how RedSeal’s network modeling and risk scoring platform can improve your vulnerability management operations. This on-demand webinar addresses:

– Identifying and resolving gaps in vulnerability scanner coverage across your relevant assets

– Risk-based prioritization of vulnerability findings for remediation or mitigation

– Identifying actionable steps to mitigate unpatched vulnerabilities

Adding Network Context to Vulnerability Prioritization

Vulnerability management is critical to maintaining security and resilience of your networks. Yet scanners can return thousands of high and critical severity results.

Knowing where to start requires a thorough understanding of your as-built network.

Adding network context to vulnerability results lets you prioritize vulnerabilities based on risk to the enterprise and improve the effectiveness of your responses.

Integration with leading vulnerability management products

Integration with Rapid7’s InsightVM vulnerability management software identifies
gaps in vulnerability scan coverage.

RedSeal’s integration with Tenable scan engines allows it to prioritize identified vulnerabilities based on the network model and highlight any scan coverage gaps in your network.

How RedSeal Works

Understand the benefits RedSeal’s cybersecurity analytics platform can bring to your network. (2:10)

RedSeal’s Model of Your Network

See how RedSeal provides the foundation for digital and cybersecurity resilience. (2:18)