SlideShare a Scribd company logo
VerifiedVulnerability
Intelligence Covering
All Systems
Secunia
Manage your software vulnerabilities
with verified, accurate and
comprehensive intelligence from
Secunia’s in-house Research brought to
you on time, every time
VIM
Our unrivaled software vulnerability management
solution, the SecuniaVulnerability Intelligence Man-
ager (VIM), is effectively a work-flow and alerts
management solution with a feed directly from our
in-house Research team into your infrastructure:
When a vulnerability is disclosed to the public, Secu-
nia’s researchers start procedures to verify it – and
test it, if required.
Once verified, a Secunia Advisory is produced with
criticality rating, attack vector, solution status and the
recommended mitigation.
As soon as Secunia Research has verified that the
intelligence about the software vulnerability is accu-
rate, our customers are notified.
By correlating the intelligence from Secunia’s vul-
nerability database with your asset inventory, you
can immediately assess and prioritize the risk the
vulnerability poses to your security, and implement
the mitigation strategy best suited to protect your
assets.
VIM
Get prioritized, verified vulnerability
alerts across your entire infrastructure.
The SecuniaVIM covers more than
50,000 systems and applications.
Secunia VIM
Vulnerability Management is a critical component of any secu-
rity infrastructure, because it enables proactive detection and
mitigation of software vulnerabilities.
Secunia supports the entire SoftwareVulnerability Manage-
ment Lifecycle. Find out how, at secunia.com
Benefits
Continuous alerts
When Secunia Research verifies
a new vulnerability, the Secunia
VIM can alert you via SMS or
email.
Customized Reporting
Ticketing systems to support
workflow management, and
customized reports covering all
advisories on new vulnerability
threats across your network.
Extensive Coverage
The largest vulnerability
management coverage in the
industry, covering more than
50,000 systems and applications.
Verified intelligence
Secunia Research verify all publically
known vulnerabilities and create a
Secunia Advisory, which includes
criticality rating, attack vector, solution
status and recommended mitigation.
543
234
739
Vulnerability information is verified and described by Secunia
Research.When a new vulnerability is verified, the
vulnerability Intelligence on applications running on hardware,
firmware, middleware and ICSs is sent to our customers.
Vulnerability Intelligence is correlated with your inventory for
assessment of vulnerability status of over 50,000 applications.
Inventory data is used to configure asset lists, groups and alerts
for correlation. Based on the intelligence and correlation,
customers are able to assess risk, make decisions and distribute
tasks. Secunia advisories contain information about existing
mitigation actions, when available.The ticketing system and re-
ports track and document risk assessment and implementation
of mitigation actions.
With its’ comprehensive coverage and high quality vulnerabil-
ity intelligence, the SecuniaVIM is a powerful tool that alerts
you when vulnerabilities are threatening your infrastructure,
enables you to analyze vulnerabilities in your IT infrastructure,
track them and eliminate them easily from a centralized dash-
board interface.
What is the Secunia VIM?
Comprehensive reporting provides an accurate assessment for risk management
and compliance purposes and a better ROI. Find out how, at secunia.com or
contact info@secunia.com

More Related Content

PDF
Healthcare It Security Necessity Wp101118
PPTX
Classification of vulnerabilities
PDF
Medical Devices Under Attack
PPTX
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
PDF
Presentation on vulnerability analysis
PDF
What You Need to Know About Intelligent Network Segmentation
PPTX
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
PPTX
Demo how to detect ransomware with alien vault usm_gg
Healthcare It Security Necessity Wp101118
Classification of vulnerabilities
Medical Devices Under Attack
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
Presentation on vulnerability analysis
What You Need to Know About Intelligent Network Segmentation
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
Demo how to detect ransomware with alien vault usm_gg

What's hot (20)

PPTX
Vulnerability Assesment
PPTX
VMRay intro video
DOCX
PPTX
How to Detect a Cryptolocker Infection with AlienVault USM
PPTX
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
PPTX
What goes into managed security services
PPTX
Vulnerability Assessment Presentation
PDF
Clinical Risk Management
PDF
Why Medical Devices Are So Vulnerable
PPTX
Incident response live demo slides final
PDF
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
PDF
Viewfinity Application Control and Monitoring 2015
PPTX
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
PPTX
Vulnerability Assessment
PPTX
How to Detect SQL Injections & XSS Attacks with AlienVault USM
PPTX
How to Solve Your Top IT Security Reporting Challenges with AlienVault
PPTX
6 Most Popular Threat Modeling Methodologies
PDF
PPTX
Malware detection how to spot infections early with alien vault usm
PPTX
Creating Correlation Rules in AlienVault
Vulnerability Assesment
VMRay intro video
How to Detect a Cryptolocker Infection with AlienVault USM
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
What goes into managed security services
Vulnerability Assessment Presentation
Clinical Risk Management
Why Medical Devices Are So Vulnerable
Incident response live demo slides final
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
Viewfinity Application Control and Monitoring 2015
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
Vulnerability Assessment
How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Solve Your Top IT Security Reporting Challenges with AlienVault
6 Most Popular Threat Modeling Methodologies
Malware detection how to spot infections early with alien vault usm
Creating Correlation Rules in AlienVault
Ad

Similar to VIM Product Description (20)

PPTX
ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...
PDF
productsheet_csi70_brief
PDF
The European Space Agency Strengthens IT Security With Secunia's Vulnerabilit...
PDF
SAM and Security Teams Must Join Forces to Enhance Security
PPTX
Vulnerability Management: What You Need to Know to Prioritize Risk
PPTX
Proatively Engaged: Questions Executives Should Ask Their Security Teams
PPTX
Module 6.pptx
PPTX
Cybersecurity Strategies for Effective Attack Surface Reduction
PPTX
Cybersecurity Strategies for Effective Attack Surface Reduction
PDF
Understanding Vulnerability Assessment.pdf
PDF
CyberCentral Summit 2018 in Prague
PDF
Is Your Vulnerability Management Program Keeping Pace With Risks?
PDF
Danfoss Shields Its Third Party Applications From Security Threats with patch...
PPTX
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
PPTX
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
PDF
Understanding Vulnerability Management | USCSI®
PDF
GP Strategies Corporation Employs the Secunia Corporate Software Inspector (C...
PDF
Vulnerability Management
PDF
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
PPTX
What's Wrong with Vulnerability Management & How Can We Fix It
ECMDay2015 - Kent Agerlund - Secunia - 10 minutes is all it takes – Managing ...
productsheet_csi70_brief
The European Space Agency Strengthens IT Security With Secunia's Vulnerabilit...
SAM and Security Teams Must Join Forces to Enhance Security
Vulnerability Management: What You Need to Know to Prioritize Risk
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Module 6.pptx
Cybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface Reduction
Understanding Vulnerability Assessment.pdf
CyberCentral Summit 2018 in Prague
Is Your Vulnerability Management Program Keeping Pace With Risks?
Danfoss Shields Its Third Party Applications From Security Threats with patch...
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Understanding Vulnerability Management | USCSI®
GP Strategies Corporation Employs the Secunia Corporate Software Inspector (C...
Vulnerability Management
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
What's Wrong with Vulnerability Management & How Can We Fix It
Ad

VIM Product Description

  • 1. VerifiedVulnerability Intelligence Covering All Systems Secunia Manage your software vulnerabilities with verified, accurate and comprehensive intelligence from Secunia’s in-house Research brought to you on time, every time VIM Our unrivaled software vulnerability management solution, the SecuniaVulnerability Intelligence Man- ager (VIM), is effectively a work-flow and alerts management solution with a feed directly from our in-house Research team into your infrastructure: When a vulnerability is disclosed to the public, Secu- nia’s researchers start procedures to verify it – and test it, if required. Once verified, a Secunia Advisory is produced with criticality rating, attack vector, solution status and the recommended mitigation. As soon as Secunia Research has verified that the intelligence about the software vulnerability is accu- rate, our customers are notified. By correlating the intelligence from Secunia’s vul- nerability database with your asset inventory, you can immediately assess and prioritize the risk the vulnerability poses to your security, and implement the mitigation strategy best suited to protect your assets. VIM
  • 2. Get prioritized, verified vulnerability alerts across your entire infrastructure. The SecuniaVIM covers more than 50,000 systems and applications. Secunia VIM Vulnerability Management is a critical component of any secu- rity infrastructure, because it enables proactive detection and mitigation of software vulnerabilities. Secunia supports the entire SoftwareVulnerability Manage- ment Lifecycle. Find out how, at secunia.com Benefits Continuous alerts When Secunia Research verifies a new vulnerability, the Secunia VIM can alert you via SMS or email. Customized Reporting Ticketing systems to support workflow management, and customized reports covering all advisories on new vulnerability threats across your network. Extensive Coverage The largest vulnerability management coverage in the industry, covering more than 50,000 systems and applications. Verified intelligence Secunia Research verify all publically known vulnerabilities and create a Secunia Advisory, which includes criticality rating, attack vector, solution status and recommended mitigation. 543 234 739 Vulnerability information is verified and described by Secunia Research.When a new vulnerability is verified, the vulnerability Intelligence on applications running on hardware, firmware, middleware and ICSs is sent to our customers. Vulnerability Intelligence is correlated with your inventory for assessment of vulnerability status of over 50,000 applications. Inventory data is used to configure asset lists, groups and alerts for correlation. Based on the intelligence and correlation, customers are able to assess risk, make decisions and distribute tasks. Secunia advisories contain information about existing mitigation actions, when available.The ticketing system and re- ports track and document risk assessment and implementation of mitigation actions. With its’ comprehensive coverage and high quality vulnerabil- ity intelligence, the SecuniaVIM is a powerful tool that alerts you when vulnerabilities are threatening your infrastructure, enables you to analyze vulnerabilities in your IT infrastructure, track them and eliminate them easily from a centralized dash- board interface. What is the Secunia VIM? Comprehensive reporting provides an accurate assessment for risk management and compliance purposes and a better ROI. Find out how, at secunia.com or contact info@secunia.com