Define: Vulnerability management?
Vulnerability management is the “cyclical practice of identifying, classifying, prioritizing, remediating, and mitigating” software vulnerabilities. Vulnerability management is integral to computer security and network security, and must not be confused with Vulnerability assessment.
Top Vulnerability Management Companies and Solutions
This article showcases Threat.Technology’s top picks for the best Vulnerability Management solutions. We selected these companies for exceptional performance in one of these categories:
- Innovative ideas
- Innovative route to market
- Innovative product
- Exceptional growth
- Exceptional growth strategy
- Societal impact
Cobalt provides a Pentest as a Service (PtaaS) platform that is modernizing the traditional, static penetration testing model. Fueled by our global talent pool of certified freelancers, Cobalt’s crowdsourced SaaS pen test platform delivers actionable results that empower agile teams to pinpoint, track, and remediate software vulnerabilities.
Hundreds of organizations now benefit from pen test findings, faster remediation times, and higher ROI for their pen test budget.. .
deepwatch, Inc. provides intelligence-driven managed cyber security services to minimize, detect, and rapidly respond to perpetually evolving cyber-attacks and threats against organizations.
Its cloud SecOps platform powers highly tailored, highly automated, and highly effective Managed Detection and Response (MDR), Managed Endpoint Detection and Response (MEDR) and Vulnerability Management (VM) services trusted by the world’s leading enterprises. deepwatch’s team of cyber security experts relentlessly work with company’s internal teams to protect its digital assets, employees, and customers.
The company was founded in 2018 and has headquarter regions in Denver, Colorado, St. Petersburg, Florida, and Herndon, Virginia..
NormShield provides comprehensive Security-as-a-Service solutions focused on cyber threat intelligence, vulnerability management and continuous perimeter monitoring. They harvest cyber threat data from multiple sources and provide actionable intelligence to their customers so they can take preventive measures.
Technology quickly changes and evolves, so does the security posture of a system. Keeping a system secure is a difficult task.
NormShield makes this task easier with its turnkey cloud or on-premise platforms enabling companies to detect and stop potential cyber threats early. NormShield Cyber Risk Scorecards provide the information necessary to protect business from cyber attacks.
The scorecards provide a letter grade and a drill down into the data for each risk category so that remediation of vulnerabilities can be prioritized.. .
edgescan is a cloud-based continuous vulnerability management and penetration testing solution. It is a highly accurate SaaS (Security-as-a-Service) solution which helps clients to discover and manage application and network vulnerabilities (full-stack information security) on an ongoing basis.
All vulnerabilities are verified by our security analysts which results in accurate, false-positive free vulnerability management. edgescan has been recognised by Gartner as a “Notable Vendor” in the Magic Quadrant for application Security testing and is the highest scoring solution in Gartner PeerInsights..
LockPath is a market leader in corporate governance, risk management, regulatory compliance (GRC) and information security (InfoSec) software. Built on the patented Dynamic Content Framework (DCF), LockPath’s flexible, scalable and fully integrated suite of applications is used by organizations to automate business processes, reduce enterprise risk and demonstrate regulatory compliance to achieve audit-ready status.
The applications are designed to manage all facets of compliance and information security programs, including policies and procedures, risk assessment and mitigation, incident tracking and remediation, vulnerability management, third-party management, business continuity planning and audit preparation. LockPath serves a client base of global organizations ranging from small and midsize companies to Fortune 10 enterprises in more than 15 industries.
LockPath is headquartered in Overland Park, Kansas. Visit http://www.lockpath.com for more information..
DeepSurface Security, Inc
DeepSurface Security (www.deepsurface.com) is the first automated Predictive Vulnerability Management suite of tools that helps cybersecurity teams automate the process of analyzing and prioritizing vulnerabilities by risk contribution on enterprise networks. Created by a veteran cybersecurity team, DeepSurface Security is trusted by enterprise companies to identify, prioritize, and research vulnerabilities in their networks.
Headquartered in Portland, Oregon, DeepSurface is a privately held company funded by Cascade Seed Fund, SeaChange Fund, and Voyager Capital. To learn more visit www.deepsurface.com..
Trusted by 25% of the Fortune 100, Twistlock is the most complete, automated and scalable container cybersecurity platform. From precise, actionable vulnerability management to automatically deployed runtime protection and firewalls, Twistlock protects applications across the development lifecycle and into production.
Purpose built for containers, serverless, and other leading technologies – Twistlock gives developers the speed they want, and CISOs the control they need. Founded in 2015 by CEO Ben Bernstein and VP R&D Dima Stopel, Twistlock is privately held with funding from Polaris Partners, 1011 Ventures, Rally Ventures, YL Ventures and Dell Technologies Capital.
Twistlock is headquartered in Portland, Oregon with offices in New York City, Baton Rouge, Louisiana, London, and Herzliya, Israel.. .
SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response. Through a single integrated platform, it drives security visibility, so decisions can be better prioritised and response time is dramatically reduced.
With SIRP, the entire cybersecurity function works as a single, cohesive unit. SIRP combines security orchestration, playbook automation and case management capabilities to integrate your team, processes and tools together.
SIRP makes security data instantly actionable, provides valuable intelligence and context, and enables adaptive response to complex cyber threats and vulnerabilities. SIRP enables organisations to optimise processes for threat response and vulnerability management for improved organisational efficiency.
SIRP Security Score (S3) calculates an organisation’s security score based on a number of internal and external factors. This enables organisations to more effectively prioritise risks, make informed decisions faster and respond more quickly to incidents..
Holm Security is global a challenger and fast growing company within automated and continuous vulnerability assessment. Today we operate in 7 markets in Europe and Asia, reaching about 15 countries.
Our platform Holm Security VMP allows everyone to effectively take control of the security of their networks, systems and web applications. We also provide a solution to analyze how resilient your users are against social engineering, like phishing and ransomware attacks.
Our platform is easy to use and you get extensive support from our support staff and security experts. An investment in our platform is a smart and efficient investment in increased security..
The Qualys Cloud Platform and integrated suite of solutions helps businesses simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Used by more than 7,700 customers in over 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100, the Qualys Cloud Platform performs more than 1 billion IP scans/audits a year resulting in over 400 billion security events.
Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including BT, Dell SecureWorks, Fujitsu, IBM, NTT, Symantec, Verizon, and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA).
The Qualys Cloud Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, pci compliance, questionnaire service, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites..
Hitachi Systems Security
Hitachi Systems Security is an information technology company that protects data and strengthen privacy and cybersecurity defenses. The company builds and delivers customized services for monitoring and protecting the critical and sensitive IT assets in infrastructures 24/7.
They complement our managed security service offering with a variety of professional security services to assess the overall cybersecurity posture, align with a security strategy. Hitachi Systems Security offers a wide range of business system design and integration services, as well as outsourcing services that take advantage of its robust data center infrastructure.
It also pushes beyond the boundaries of IT to create new value for customers, with the aim of becoming a global service company to which customers can entrust any operation. The company also offers add-on services, including vulnerability management, cybersecurity analytics dashboard, office 365 cloud security monitoring, ATM and POS monitoring, file integrity monitoring, security device management, phishing protection, and intrusion detection monitoring.
Hitachi Systems Security was founded in 1999 and is headquartered in Blainville, Quebec, Canada.. .
BeyondTrust is the global leader in privilege authorization management, access control and security solutions for virtualization and cloud computing environments. BeyondTrust empowers IT governance to strengthen security, improve productivity, drive compliance and reduce expense.
The company’s products eliminate the risk of intentional, accidental and indirect misuse of privileges on desktops and servers in heterogeneous IT systems.. .
Fortify 24×7 is a leading managed security services provider offering comprehensive services that cover all aspects of Prevention, Detection and Response. The company provides ‘Security as a Service’ across multiple categories including Endpoint Protection, Firewall/IDS, DLP, PAM, IAM and more via a collaborative cloud-based platform, which enables customers to tackle evolving cyber threats on a real-time basis.
Fortify 24×7 has successfully filled a gap in the industry with its dedicated 24x7x365 Security Operations Center (SOC), keeping a steady finger on the pulse of cyber threats across North America and trends across the world. Furthermore, a proactive approach has pushed the company to rapidly develop technologies in-house given the need of its customers.
Fortify 24×7 is a fully equipped and dedicated team who identifies cyber threats relevant to customer organizations, conducts analysis on impact and actively connects the dots across multiple incidents. This core incident response service is strengthened by preventive vulnerability management systems that span an organization’s cyber and domain footprint and enables our customers to be cyber resilient.
Fortify 24×7 current customer base includes SMB’s, Fortune 500 companies, healthcare (payor/provider), education, entertainment & media, and state/local government.. .
NetSPI combines managed services, application assessment, network assessment, and advisory services to deliver full-spectrum threat and vulnerability management solutions that transform IT security. Built on 15 years of deep-dive pentesting and security expertise, our CorrelatedVM™ platform, proven processes, and end-to-end managed services programs help financial services, technology, healthcare, and retail leaders find, fix, and prevent threats across the enterprise—before they disrupt business.
We put the right people, processes, and technology in the right place at the right time to increase visibility across your portfolio, eradicate your blind spots, and protect your most critical assets.. .
Acunetix is the market leader in automated web application security testing, and is the tool of choice for many Fortune 500 customers. Acunetix detects and reports on a wide array of web application vulnerabilities.
Acunetix also includes integrated vulnerability management features to extend the enterprise’s ability to comprehensively manage, prioritise and control vulnerability threats – ordered by business criticality. Acunetix is a privately held company with its offices in Malta and the UK.
It is a Microsoft Certified Partner. It also has a sister company 3CX, a developer of IP PBX software for Windows..
Outpost24 is a vulnerability management company providing best-in-class solutions to help users identify and mitigate weaknesses in their network. Outpost24 offers real-time vulnerability alerts and solution-based reports that facilitate the instant recognition of imminent threats.
With more than 40 locations worldwide, Outpost24 collectively scans over 400 million IP addresses weekly and detects more than 12 thousand vulnerabilities on a daily basis. More than 2000 companies around the world trust Outpost24 to protect their internal and external network security; from government entities, to financial institutions; and from global retailers to telecommunication providers..
Tripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration.
Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence. Learn more at www.tripwire.com, get security news, trends and insights at http://www.tripwire.com/state-of-security/ or follow us on Twitter @TripwireInc..
Beyond Security’s testing solutions accurately assess and manage security weaknesses in networks, applications, industrial systems and networked software. We help businesses and governments simplify the management of their network and application security thus reducing their vulnerability to attack and data loss.
Our product lines, AVDS (network vulnerability management) and beSTORM (software security testing), will help you secure your network and applications, comply with your security policy requirements and exceed industry and government standards.. .
BreachLock is a security startup that offers a unique SaaS platform delivering on-demand, continuous and scalable security testing suitable for modern cloud and DevOps powered businesses. The BreachLock platform leverages both human powered penetration testing and AI-powered automated scans to create a powerful and easy to use solution that delivers continuous and on-demand vulnerability management.
BreachLocks’s modern SaaS-based approach redefines the old school and time-consuming pen test model into fast and comprehensive security as service. As a result, CIO’s and CISO’s get a single pane view into their application and network security posture.
The BreachLock platform facilitates collaboration between your DevOps and BreachLock security researchers empowering them to fix security gaps at the speed of business.. .
miniOrange is a cloud based platform which provides Single Sign-On (SSO), Two Factor Authentication (2FA), Fraud Prevention and Cloud/Network Security. miniOrange is founded by security architects and technology leaders who have extensive experience in solving complex security problems of the industry via technology using global delivery models.
Their Differentiation lies in applying technical expertise and experience to unique Industry needs and challenges. The team at miniOrange brings extensive experience and expertise in Security Consulting and Product development.
They take pride in partnering with their customers and bring forth their security domain expertise in Cloud Security, Identity and Access Management, Mobile Security, Vulnerability Management and have specific products and solutions in these areas. Their team includes security architects and information security professionals who have extensive experience in design, architecture and delivery of complex enterprise security products.
They have built high performing teams in US and India and scaled them to support mid and large sized enterprises. Their team has multiple papers published on various security and engineering topics related to Strong Authentication, Access Governance, Vulnerability management, Mobile Security – Access Gateway, Cloud Security – IAM of a cloud stack, Agile adoption in distributed teams, Team collaboration etc.
They are also a strong agile proponent and have successfully transformed teams doing waterfall into adopting agile/scrum methodologies. They have been responsible for leading a range of product releases, from a v1.0 to a flagship product generating millions of dollars in revenue..
Kryptowire was jumpstarted by the Defense Advanced Research Projects Agency (DARPA) and the Department of Homeland Security (DHS S&T), and has been vetted by the US military, law enforcement, and intelligence agencies. Kryptowire provides mobile application security analysis tools, antiâ€piracy technologies, mobile app marketplace security analytics, and Enterprise Mobility Management (EMM) solutions.
Kryptowire was founded in 2011, is based in Fairfax, Virginia, and has a customer base ranging from government agencies to national cable TV companies.. .
Lumension Security, Inc., a global leader in endpoint management and security, develops, integrates and markets security software solutions that help businesses protect their vital information and manage critical risk across network and endpoint assets. Lumension enables more than 5,100 customers worldwide to achieve optimal security and IT success by delivering a proven and award-winning solution portfolio that includes Vulnerability Management, Endpoint Protection, Data Protection, Antivirus and Reporting and Compliance offerings.
Lumension is known for providing world-class customer support and services. Headquartered in Scottsdale, Arizona, Lumension has operations worldwide, including Virginia, Texas, Utah, Florida, Ireland, Luxembourg, the United Kingdom, Australia, and Singapore.
Lumension: IT Secured. Success Optimized.™ More information can be found at www.lumension.com.
Sacumen specializes in working with Security Product Companies. We are working with 50+ Security Product Companies such as Symantec, Palo Alto Networks, Varonis, AlienVault, IBM, CA Technologies, ThreatConnect, SecurityScorecard, ForgeRock, Code42, BigID, Flashpoint etc in the areas of Connector Development, Connector Support, and Product Engineering.
We have built 700+ Connectors in the areas of SIEM, IAM, Ticketing Systems, Incident Response, Cloud Applications, Cloud Monitoring, Threat Intelligence Feed, Endpoint Security, Cloud Storage, GRC, Vulnerability Management, Authentication, etc.. .
Foundstone, a division of security software maker McAfee, provides enterprise-level vulnerability management that helps network operators mitigate the chances of a data security breach. In addition to software, the company’s Foundstone Professional Services unit offers technical and risk management consulting services.
Foundstone Education provides training courses, online and on-site, in security awareness programs. Foundstone was founded in 1999 by George Kurtz, Chris Prosise, Gary Bahadur, and William Chan.
As of 2004, it was acquired by McAfee.. .
Protecode Incorporated is a software company specializing in open source licensing and vulnerability management solutions. Protecode offers its products and services throughout the world through a network of partners in the Americas, Europe, the Middle-East and Asia.
Protecode solutions help with managed adoption of open source software, accelerating development, reducing development costs, improving software quality, identifying security vulnerabilities, and removing Intellectual Property uncertainties. Protecode products can detect and manage open source and other third party content in a software portfolio at any stage of the software development life cycle.
Protecode products and services help organizations implement a structured open source software adoption and management process and have been adopted by hundreds of software organizations worldwide in industries as diverse as gaming, mobile apps, financial, embedded software, semiconductors, communications, avionics, military, software services and eHealth. Thanks to the highly scalable architecture and business model, Protecode products have been adopted by global tier one companies with over 100,000 employees, and by organizations with as few as ten people.
Protecode delivers solutions that are fast, accurate, complete, affordable, and usable by stakeholders in an organization. Protecode products are easy to adopt, install, use and support..
eSec Forte Technologies
eSec Forte® Technologies is a CMMi Level 3 certified Global Consulting and IT Services company with expert offerings in Information Security Services, Forensic Services, Malware Detection, Security Audit, Mobile Forensics, Vulnerability Management, Penetration Testing, Password Recovery, DDOS Assessment, PCI DSS QSA Compliance etc. We are certified by CERT-In for providing Information Security Auditing Services.
We are Authorized Technology Partners of Information Security Solutions Tufin (Firewall Management), Nessus, Tenable SecurityCenter, Core Impact, Atola Technology, Arcos (Privileged Access Management), Netsparker, Burpsuite, AccessData FTK, AD Enterprise , E-Discovery, Checkmarx (Application Security Testing), Cyber Deception and more. We are also Manufacturer for CrackBox (Our Proprietary Tool for Password Breaking/Cracking) and DDOS Assessment..
Infobyte is the leading provider in offensive cyber security. Our goal is to help you understand your security posture by offering customized solutions that optimize your audit process and enhance the coverage for your vital information.
Our experts designed Faraday®, a comprehensive platform for vulnerability management that simplifies your work automating scans and reports. A real-time collaborative environment that increases transparency, speed and efficiency for your audits and for your teams.
This provides greater visibility and helps you to make smarter security investments and leverage your existing resources. We service numerous companies from the Global 2000.
Our tailor-made solutions allows us to be sensitive to the different needs and requirements of an organization across a wide range of sizes and industries providing turn-key solutions for every case. Infobyte is strongly committed to the IT Security community.
We are a founding member of Ekoparty, which is the largest security conference in Latin America. At Infobyte we offer you personalized services and proactive solutions to ensure your information stays in the right hands.
www.infobytesec.com www.faradaysec.com. .
eEye Digital Security
eEye Digital Security, Inc. is a developer of endpoint security and vulnerability management software solutions, as well as a contributor to security research and education.
eEye’s software products provide a vulnerability management solution that addresses the full lifecycle of security threats: before, during and after attacks.. .
NanoSec is the pioneer in Application-Centric Security solutions aimed at protecting any application from unknown Cyber-Threats on any infrastructure, at any scale. NanoSec secures applications through out their life cycle from development to production.
API-Driven Security that moves with Apps, Anywhere, Anytime.. .
Trusted Metrics provides Elastic SOC®, a multi-tenant, cloud-based platform which gives organizations of any size the ability to incorporate SIEM as a framework for centralized log correlation, as well as intrusion detection, asset management, vulnerability management, threat intelligence, alarm generation and network performance management into a single console. This solution was specifically designed with managed service providers (MSPs) and managed security service providers (MSSPs) in mind, giving them the ability to deploy a white-labeled virtual Security Operations Center (SOC) for their clients, enabling around-the-clock network security monitoring, protection and response.
Elastic SOC® allows any organization the ability to quickly analyze threats, provide on-demand or scheduled reporting on IT Operations, receive real-time alerts when unfavorable conditions occur, or perform long-term forensic analysis. Proud to be named a Red Herring Global 100 Finalist for 2016 and CRN’s Coolest Emerging Vendors for 2015 and 2016, we are dedicated to our channel partners by providing a multi-tenant offering that allows unprecedented visibility into their clients’ networks..
Secunia is an IT security solutions provider allowing businesses and private individuals globally manage and control vulnerability threats and risks across their networks and endpoints. Its award-winning portfolio equips corporate and private customers worldwide with Vulnerability Intelligence, Vulnerability Assessment, and automated Patch Management tools to manage and control vulnerabilities across their networks and endpoints.
All Vulnerability Management products in Secunia’s portfolio provide proven endpoint protection against vulnerabilities, due to their combination of unique application scanning, expertise, and customer service. All of this is achieved by the dedicated efforts of the industry-renowned Secunia Research Team and enhanced by Secunia’s focused sales and support functions.
It is a preferred supplier for enterprises, such as Fortune 500, Global 2000 businesses, and government agencies worldwide. Founded in 2002, Secunia has operations in North America, the U.K., and the Middle East, and is headquartered in Copenhagen, Denmark..
StillSecure specializes in commercial and open source secure network infrastructure solutions. Products include network access control (NAC), intrusion detection/prevention (IDS/IPS), vulnerability management and a unified networking/security platform.
Established in 2000, StillSecure customers range from midsize organizations to the worldâ€™s largest enterprises with a strong emphasis in government, financial services, education, and healthcare.. .
Corporate Encryption GMBH is a cyber-security company, specialized in secure encrypted communications. We have developed a cutting edge communication platform – in order to mitigate the growing risks of Internet communications, hackers, espionage and alike.
We are a strong International team of security, cyber-forensic and encryption specialists, with offices in Switzerland and Denmark. Our team consists of high performing and great people – the best in the industry.
Corporate Encryption GMBH is co-owned and secured by one of the world’s leading IT-security companies, CSIS Security Group A/S with HQ in Denmark. CSIS Security Group A/S is a pioneer in security and vulnerability management and enables major enterprises, banks and governments to fight the growing security threats.
Our Turnkey Encryption Platform (TEP) is used in more than 100 countries and is continuously audited by 3. party security experts and white-hat hackers..
NETpeas is the leading provider of Cor-evidence, the first marketplace cloud-based multi-engines vulnerability management service. Cor-evidence integrates solutions and services to create a single access.
Customers have access to technology leaders in vulnerability management, compliance achievement, and IT monitoring. It combines astonishing benefits as flexibility of use based on credit plan, accurate scanning using multiple engines, and unified straight-to-the-point deliverable..
Tarsus SecureData is a value-added distributor of information risk management and network solutions for the African sub-continent and Indian Ocean islands. A cross-section of the available solutions from Tarsus SecureData illustrates wide coverage of the following information security and risk management domains: business continuity, security appliances and devices, hardware authentication, identity and access management, security and vulnerability management, secure content management, threat management and security services.
Tarsus SecureData’s information security and risk management solutions include best-of-breed network, endpoints, messaging and Web. In addition, as a value-add to vendor, channel and customer, Tarsus SecureData also provides a full complement of support, pre-sales and professional services around the solutions positioned in each discrete security vertical..
RandomStorm is a UK-based network security, vulnerability management and compliance company, focused on providing enterprise-level, proactive security management products and services to commercial and public sector organisations. RandomStorm’s experienced and certified security experts are able to offer customers a wide range of integrated world-class security vulnerability assessment and professional security services.
Covering initial consultancy and gap analysis through to network and application testing, as well as managing client’s business compliance accreditation process, RandomStorm aims to work with organisations to ensure that their security investment is fully optimised on a 24x7x365 basis.. .
Cyphere is a cyber security company that helps to secure most prized assets of a business. We provide technical risk assessment (pen testing/ethical hacking) and managed security services.
This advice is a true third party opinion, free from any vendor inclinations or reselling objectives. Service quality underpins everything we do.
Our security expertise, sector specific experience & non-salesy approach helps organisations to manage cyber security threats effecitvely. Penetration Testing Cyphere’s penetration testing services offer an in-depth insight into technical risks affecting businesses.
We don’t report and run. Our extensive focus on service quality, insight into client business ensures that we have an understanding of drivers, nuances of the business and contextual awareness.
Managed Security Services Managed security services adds to your continuous security processes, by continuously identifying flaws that may expose sensitive information or systems on the internet. Our vulnerability scanning process extended towards vulnerability management solutions, managed cloud and perimeter services offer round the clock monitoring of your threats.
To know more, please book a 15 mins call to decide whether you require such services or what to look out for when buying these services.. .
Clearpath is the trading name for World Focus 560 CC (Reg no: 2004/083054/23), a South African Close Corporation established in 2004. Besides the flagship SPLICE system, Clearpath has also designed security architectures for custom authentication offloading and Web Application Firewalls.
In addition, Clearpath provides Information Security consulting services, which include: – Security Architecture Design and Assessment – Vulnerability Assessment and Vulnerability Management – Incident Response – Information Risk Management – Infrastructure Auditing – Systems Testing – Security Systems Configuration and Management – Standards Development and Implementation. .
ThreatGuard was formed in March 2002 by a team of former military members who brought their extensive experience in information security, software development, communications, intelligence, and enterprise management to the commercial sector. ThreatGuard remains a privately held veteran-owned company that is still guided by those original founders.
From the onset, ThreatGuard has been a consistent technology leader with innovations such as the continuous vulnerability management system and the first product to support automated compliance checklists and remediation using the government’s Security Content Automation Protocol (SCAP). In the years since, it has developed the first commercial OVAL product, as well as the first vulnerability management products to receive OVAL compatibility awards.
ThreatGuard has continued to raise the bar and is a recognized leader for standards-based security compliance and vulnerability assessment solutions.. .
EstuárioTI is a Brazilian company that offers information security products and services. Its services include mobile and web application analysis, vulnerability management, intrusion testing, Assisted Secure Administration (ASA), and training in information security.
The company’s products include Wing: vulnerability management software; Avisa.lá: a tool that monitors the availability and security of websites; and El Pescador: an educative phishing platform that provides training about malicious email attacks. EstuárioTI is based in Reef and Sao Paulo..
This article was written by Benjamin Skute from Threat.Technology. The editor for this article was Tess Page. If your company is featured in this article and you want to have amendments made please contact us on: [email protected].
Alternatively you may write to us at: Threat.Technology/Fupping Ltd, First Floor, 61-63 Rochester Pl, London NW1 9JU.