Stay at the forefront of cybersecurity challenges with Network Configuration Manager's cutting-edge vulnerability detection module. With daily updates sourced from the National Vulnerability Database (NVD) and direct feeds from vendors, our system guarantees that your defense mechanisms are always up-to-date with the latest threat intelligence. Also, acquire insights into devices’ vulnerability, exposed devices, and version distribution. This comprehensive overview of vulnerability details strengthens the resilience and integrity of your network.
Effortlessly access CVE details along with severity ratings ranging from Critical to Low, facilitating effective prioritization of fixes.
Look up any CVEs in the search option using the CVE ID and promptly obtain comprehensive details about a specific vulnerability.
Choose a timeframe during which vulnerabilities were identified. You can either select from the provided range or specify a custom range of your preference. The vulnerabilities detected within this chosen period will be displayed.
Leverage our foundational scoring system to quantify the impact of every vulnerability, assisting you in assessing the urgency of each threat.
Stay updated with counters indicating the total number of vulnerabilities, critical vulnerabilities, and exploitable weaknesses.
If you discover any vulnerabilities that are not listed, you have the option to request an update on vulnerability data from the engineering team.
Categorize CVEs based on their status, ranging from 'Not Applicable' to 'Resolved,' streamlining the remediation process for enhanced efficiency.
NCM scans network for vulnerabilities and provides comprehensive reports on impacted CVEs, covering device count, severity, attack type, overview, and reference URLs.
This is similar to vulnerability counters, but the distinction lies in its device specificity, including information on affected devices, device versions, and more.
Synchronization of firmware vulnerability data from NIST and other vendors to the Network Configuration Manager's database is facilitated by allowing users to schedule regular syncing. Users have the flexibility to set a specific time for the daily synchronization. Once a schedule is established, the vulnerability data is automatically synchronized at the specified time. Network Configuration Manager also provides the option to edit or change the scheduled time to align with user preferences.
If your network is isolated, automatic updates of the vulnerability database through firmware vulnerability scanning with data from NIST vulnerability management may not be possible. In such instances, opting for a manual import of vulnerability data is recommended. For more details, visit this page.
In-depth information of each CVE including base score, summary, and reference URL along with published and updated time will be present.
This report provides details of exposed devices in your network along with their severity levels.
This report offers insights into device versions and their vulnerabilities, detailing the number of vulnerabilities present for each specific device version and their respective severity levels.
This report provides a trend graph on total vulnerabilities in a day and how many are fixed in that day.
This report lists the history of the devices that had a vulnerability of any kind. The tabular column consists of host name, series, model, OS type, latest OS version, and the count of live vulnerabilities.