SlideShare a Scribd company logo
www.secpod.com
Chapter 3: How to detect, assess, prioritize, and remediate
vulnerabilities using SanerNow?
THE ART OF MANAGING
AND SECURING
ENDPOINTS
SanerNow Product Series
2
Copyright © 2008 - 2021 SecPod Technologies - AUTHORISED USE ONLY
PRESENTERS
BHARATH KUMAR
KP
Lead Product Specialist
SecPod
DIXITHA S
Product Marketing Lead
SecPod
3
TODAY'S
AGENDA
Copyright © 2008 - 2021 SecPod Technologies - AUTHORISED USE ONLY
About SecPod SanerNow
Vulnerability Management (VM)
Questions and Answers
What are the OSs & Applications
SanerNow VM supports?
Top vulnerability management scenarios, a
walkthrough of SanerNow
Our home grown SCAP Feed & How
SanerNow VM works?
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
04
SanerNow Vulnerability Management
Copyright © 2008 – 2021 SecPod Technologies - AUTHORISED USE ONLY
05
SecPod’s SCAP feed, the world’s largest vulnerability
database with over 130,000+ security checks
Key metrics of SecPod SCAP Feed Total Number Supported
Total no of CVEs 127981
No of products covered across
multiple platforms
8381
SLA time for supporting critical
vulnerabilities
24 Hours
No of OSs supported 181
Copyright © 2008 - 2021 SecPod Technologies - AUTHORISED USE ONLY
6
How SanerNow Vulnerability Management works
Vulnerabilities Sync
Hosting 130,000+
vulnerability checks
Copyright © 2008 - 2021 SecPod Technologies - AUTHORISED USE ONLY
7
WHAT ARE THE OSs SUPPORTED BY SANERNOW
VM?
Linux
(Includes Redhat, CentOS,
Oracle, Ubuntu, Amazon Linux
etc.)
Windows
(All Windows versions
including Server OSs)
macOS
(All variants till macOS 10.15)
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
08
Top Vulnerability Management Scenarios and how
SanerNow simplifies it – A walkthrough of the product
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
09
Vulnerability scans are run only once in a month as they
take a long time to complete
Scenario 1
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
010
When a critical high-risk vulnerability is reported, it is
hard to detect it immediately in a network
Scenario 2
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
011
Even after running multiple scans, vulnerability detection
is not accurate
Scenario 3
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
012
During vulnerability scans it is difficult to track when a
high-risk critical vulnerability is detected
Scenario 4
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
013
Dilemma in understanding the security risks each
vulnerability possesses
Scenario 5
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
014
Stuck with a huge pile of vulnerabilities in the network and
not sure about what to remediate first
Scenario 6
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
015
There is a huge security gap between the detection and
remediation of vulnerabilities
Scenario 7
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
016
Taking the manual route for managing vulnerabilities is
daunting and time-consuming
Scenario 8
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
017
Most of the time, vulnerability details are scattered and
getting clear insights is difficult
Scenario 9
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
018
Bulky reports are ineffective for vulnerability
management analysis
Scenario 10
1
9
Copyright © 2008 - 2021 SecPod Technologies - AUTHORISED USE ONLY
QUESTIONS?
Copyright © 2008 - 2021 SecPod Technologies - AUTHORISED USE ONLY
20
KEEP YOUR ENDPOINTS
SECURE FROM
ATTACKERS!
TRY SANERNOW FREE
30-day unlimited access on 10 devices
2008 SecPod Founded
(Security Podium), based
in USA and India
2012 Launched SCAP Feed as
OEM service to major
security vendors, such as
AlienVault,
CloudPassage, Amazon
2016
Launched SanerNow,
a SaaS platform for
endpoint security and
management
2009 2015 2018
Released SecPod Saner 2.x
with endpoint threat detection
and response
Launched SecPod
Saner endpoint
scanning, remediation,
compliance product
Only company to host large
scale, commercial grade
SCAP content repository
SecPod is leading provider of endpoint security and management solutions. SecPod
(Security Podium, incarnated as SecPod) has created revolutionary SanerNow
platform and tools that are used by MSPs and enterprises worldwide. SecPod also
licenses security technology to top security vendors through its SCAP Content
Professional Feed.
ABOUT
For enquiries, contact us at: Email: info@secpod.com | Tech Support: support@secpod.com
Phone: (+1) 918 625 3023 (US) | (+91) 80 4121 4020 (IN)

More Related Content

PPTX
The Art of Managing and Securing Endpoints
PPTX
How to securely manage endpoints using SanerNow
PPTX
How Mid Size Enterprises Can Automate Vulnerability Management and Prevent Cy...
PPTX
How can SMEs combat cyberattacks through automated vulnerability management?
PPTX
The Art of Managing and Securing Endpoints with SanerNow Patch Management
PPTX
How to implement security compliance with SanerNow
PPTX
How to Implement Organization Wide Cyber Hygiene?
PPTX
Mind the gap_cpx2022_moti_sagey_final
The Art of Managing and Securing Endpoints
How to securely manage endpoints using SanerNow
How Mid Size Enterprises Can Automate Vulnerability Management and Prevent Cy...
How can SMEs combat cyberattacks through automated vulnerability management?
The Art of Managing and Securing Endpoints with SanerNow Patch Management
How to implement security compliance with SanerNow
How to Implement Organization Wide Cyber Hygiene?
Mind the gap_cpx2022_moti_sagey_final

Similar to How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow? (20)

PDF
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
PPTX
How to effectively monitor and manage IT assets in real-time using SanerNow
PPTX
Uncovering Vulnerabilities Beyond Software Vulnerabilities
PPTX
Annual Vulnerability Report Insights - 2022
PPTX
How to Achieve NIST Compliance using SanerNow?
DOCX
Security architecture proposal template
PPTX
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
PDF
Why Check Point - Moti Sagey
PDF
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
PDF
End to End Security - Check Point
PDF
Making Network Security Relevant
PPTX
Security automation architecture principles for effective vulnerability manag...
PDF
AWS live hack: Atlassian + Snyk OSS on AWS
PDF
Uncover Vulnerabilities Beyond Software Vulnerabilities
PDF
Symantec Best Practices for Cloud Security: Insights from the Front Lines
PDF
2018 06 Presentation Cloudguard IaaS de Checkpoint
PDF
AWS live hack: Docker + Snyk Container on AWS
PDF
PIONEERING GEN V SECURITY WITH CHECK POINT
PDF
SOLUCIONES CHECKPOINT - Redes y Comunicaciones
PPTX
Check Point Corporate Overview 2020 - Detailed
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How to effectively monitor and manage IT assets in real-time using SanerNow
Uncovering Vulnerabilities Beyond Software Vulnerabilities
Annual Vulnerability Report Insights - 2022
How to Achieve NIST Compliance using SanerNow?
Security architecture proposal template
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Why Check Point - Moti Sagey
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
End to End Security - Check Point
Making Network Security Relevant
Security automation architecture principles for effective vulnerability manag...
AWS live hack: Atlassian + Snyk OSS on AWS
Uncover Vulnerabilities Beyond Software Vulnerabilities
Symantec Best Practices for Cloud Security: Insights from the Front Lines
2018 06 Presentation Cloudguard IaaS de Checkpoint
AWS live hack: Docker + Snyk Container on AWS
PIONEERING GEN V SECURITY WITH CHECK POINT
SOLUCIONES CHECKPOINT - Redes y Comunicaciones
Check Point Corporate Overview 2020 - Detailed

More from SecPod (6)

PPTX
Cybersecurity Strategies for Effective Attack Surface Reduction
PPTX
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
PPTX
Align Your ITSM and SecOps Strategy for Unstoppable IT
PPTX
ProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptx
PPTX
Cybersecurity Strategies for Effective Attack Surface Reduction
PPTX
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Cybersecurity Strategies for Effective Attack Surface Reduction
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Align Your ITSM and SecOps Strategy for Unstoppable IT
ProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptx
Cybersecurity Strategies for Effective Attack Surface Reduction
Closing Often Missed Vulnerabilities that Leave Organizations Exposed

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Spectroscopy.pptx food analysis technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Approach and Philosophy of On baking technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
Teaching material agriculture food technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Empathic Computing: Creating Shared Understanding
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Understanding_Digital_Forensics_Presentation.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Chapter 3 Spatial Domain Image Processing.pdf
sap open course for s4hana steps from ECC to s4
Review of recent advances in non-invasive hemoglobin estimation
Spectroscopy.pptx food analysis technology
Per capita expenditure prediction using model stacking based on satellite ima...
Programs and apps: productivity, graphics, security and other tools
Approach and Philosophy of On baking technology
Encapsulation_ Review paper, used for researhc scholars
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Teaching material agriculture food technology
Reach Out and Touch Someone: Haptics and Empathic Computing
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Big Data Technologies - Introduction.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?

  • 1. www.secpod.com Chapter 3: How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow? THE ART OF MANAGING AND SECURING ENDPOINTS SanerNow Product Series
  • 2. 2 Copyright © 2008 - 2021 SecPod Technologies - AUTHORISED USE ONLY PRESENTERS BHARATH KUMAR KP Lead Product Specialist SecPod DIXITHA S Product Marketing Lead SecPod
  • 3. 3 TODAY'S AGENDA Copyright © 2008 - 2021 SecPod Technologies - AUTHORISED USE ONLY About SecPod SanerNow Vulnerability Management (VM) Questions and Answers What are the OSs & Applications SanerNow VM supports? Top vulnerability management scenarios, a walkthrough of SanerNow Our home grown SCAP Feed & How SanerNow VM works?
  • 4. Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY 04 SanerNow Vulnerability Management
  • 5. Copyright © 2008 – 2021 SecPod Technologies - AUTHORISED USE ONLY 05 SecPod’s SCAP feed, the world’s largest vulnerability database with over 130,000+ security checks Key metrics of SecPod SCAP Feed Total Number Supported Total no of CVEs 127981 No of products covered across multiple platforms 8381 SLA time for supporting critical vulnerabilities 24 Hours No of OSs supported 181
  • 6. Copyright © 2008 - 2021 SecPod Technologies - AUTHORISED USE ONLY 6 How SanerNow Vulnerability Management works Vulnerabilities Sync Hosting 130,000+ vulnerability checks
  • 7. Copyright © 2008 - 2021 SecPod Technologies - AUTHORISED USE ONLY 7 WHAT ARE THE OSs SUPPORTED BY SANERNOW VM? Linux (Includes Redhat, CentOS, Oracle, Ubuntu, Amazon Linux etc.) Windows (All Windows versions including Server OSs) macOS (All variants till macOS 10.15)
  • 8. Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY 08 Top Vulnerability Management Scenarios and how SanerNow simplifies it – A walkthrough of the product
  • 9. Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY 09 Vulnerability scans are run only once in a month as they take a long time to complete Scenario 1
  • 10. Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY 010 When a critical high-risk vulnerability is reported, it is hard to detect it immediately in a network Scenario 2
  • 11. Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY 011 Even after running multiple scans, vulnerability detection is not accurate Scenario 3
  • 12. Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY 012 During vulnerability scans it is difficult to track when a high-risk critical vulnerability is detected Scenario 4
  • 13. Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY 013 Dilemma in understanding the security risks each vulnerability possesses Scenario 5
  • 14. Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY 014 Stuck with a huge pile of vulnerabilities in the network and not sure about what to remediate first Scenario 6
  • 15. Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY 015 There is a huge security gap between the detection and remediation of vulnerabilities Scenario 7
  • 16. Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY 016 Taking the manual route for managing vulnerabilities is daunting and time-consuming Scenario 8
  • 17. Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY 017 Most of the time, vulnerability details are scattered and getting clear insights is difficult Scenario 9
  • 18. Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY 018 Bulky reports are ineffective for vulnerability management analysis Scenario 10
  • 19. 1 9 Copyright © 2008 - 2021 SecPod Technologies - AUTHORISED USE ONLY QUESTIONS?
  • 20. Copyright © 2008 - 2021 SecPod Technologies - AUTHORISED USE ONLY 20 KEEP YOUR ENDPOINTS SECURE FROM ATTACKERS! TRY SANERNOW FREE 30-day unlimited access on 10 devices
  • 21. 2008 SecPod Founded (Security Podium), based in USA and India 2012 Launched SCAP Feed as OEM service to major security vendors, such as AlienVault, CloudPassage, Amazon 2016 Launched SanerNow, a SaaS platform for endpoint security and management 2009 2015 2018 Released SecPod Saner 2.x with endpoint threat detection and response Launched SecPod Saner endpoint scanning, remediation, compliance product Only company to host large scale, commercial grade SCAP content repository SecPod is leading provider of endpoint security and management solutions. SecPod (Security Podium, incarnated as SecPod) has created revolutionary SanerNow platform and tools that are used by MSPs and enterprises worldwide. SecPod also licenses security technology to top security vendors through its SCAP Content Professional Feed. ABOUT For enquiries, contact us at: Email: info@secpod.com | Tech Support: support@secpod.com Phone: (+1) 918 625 3023 (US) | (+91) 80 4121 4020 (IN)