Home » Vulnerability Management
 

Vulnerability Management

With a highly efficient vulnerability management system, Endpoint Central provides a risk-based diagnosis framework to mitigate different kinds of security threats that can destruct the functionality of the system. With Vulnerability Management feature of Endpoint Central, you can:

Perform Vulnerability Detection and Remediation

  • Vulnerability Assessment and Prioritization: It facilitates a continuous scanning of vulnerabilities for both OS and Third-Party applications across all the managed computers in your network. You can later access and prioritize the discovered vulnerabilities based on Exploit Status, Patch Availability, CVSS scores, Severity Levels, published and discovered dates.
  • Vulnerability Remediation: After assessing and prioritizing the vulnerabilities, it's crucial to remediate them by deploying the appropriate patches—either manually or through automated patch deployment tasks using the Patch Management feature. Timely patching plays a vital role in closing security gaps, preventing exploitation, and ensuring that known vulnerabilities do not become entry points for attackers.
  • Zero-day Vulnerability Mitigation: The pro-active diagnosis of zero-day vulnerabilities can help you discover gaps or flaws in applications or operating systems. These zero-day vulnerabilities will be displayed in a separate view for your immediate attention. You can also remediate them.

Monitor Compliance and Implement Network Access Controls

  • System, Web-Server Hardening: The security configurations feature of Endpoint Central is based on over 200+ rules of CIS and STIG benchmarks. You can identify the security misconfigurations present across the managed systems and web server misconfigurations present across the managed servers and view the resolution to fix the issue.
  • CIS Compliance Checks: Some enterprises may follow bench-marking guidelines set by CIS for providing certifications after security audits. If your enterprise follows those guidelines, you can audit the computers using the console. Endpoint Central provides those compliance checks by auditing the endpoints based on 90+ policies framed by CIS and then gives a detailed report on how much these compliance guidelines have been met by the computers. If any rules fail to comply, manual resolutions are also provided. Endpoint Central is a certified CIS vendor. We have been awarded CIS Security Software Certification for CIS Benchmark(s).
  • Network Access Control (NAC) using System Quarantine Policy: Endpoint Central's system quarantine policy helps organizations to implement Network Access Control (NAC) and proactively manage system compliance, reduce vulnerabilities, and enhance overall security posture, as you can isolate the non-compliant systems based on certain rules.

Perform Audits and Comprehensive Reporting

  • High-risk Software Audit: You can identify and monitor end-of-life software, which poses significant security risks due to lack of vendor support. Endpoint Central also detects high-risk applications like remote desktop sharing and peer-to-peer software, which can expose firewall ports, enable unverified file sharing, and increase the risk of malware or data breaches. These can be uninstalled if unnecessary or added to an exception list if deemed essential for business operations.
  • Port Audit: Every application or service uses a port to communicate over a network. With continuous port audits, you can monitor active ports, identify what's listening on them, and detect exposed or unintended ports.
  • Generate and Schedule Reports: You can generate and schedule detailed reports about all the vulnerability management processes to ensure adherence to standards. These reports, categorized as Executive and Pre-defined, provide detailed insights into system patching, aiding in vulnerability identification and addressing network security and compliance concerns.

To learn more about Comprehensive Coverage, refer to this page.

If you have any further questions, please refer to our Frequently Asked Questions section for more information.

Was this article helpful?

Thank you for your feedback!

Sorry about that!

By clicking "Submit", you agree to processing of personal data according to thePrivacy Policy.
Back to Top