Vulnerabilities / Threats

11:55 AM
Dark Reading
Dark Reading
Products and Releases

Cygilant Launches New Vulnerability and Patch Management Subscription Service

Cygilant's Industry-first 'One Vendor' Approach to Vulnerability and Patch Management Aims to Streamline Workflows; Speeding Cyber Threat Response Times and Lowering Cost of Ownership

Boston, Mass., October 24, 2017 - Cygilant (formerly EiQ Networks), a pioneer in hybrid security as a service, today launched a new combined vulnerability and patch management (VPM) subscription service.  This industry-first approach to vulnerability and patch management is now available to companies that have invested in Qualys, Rapid7, and Tenable vulnerability management technologies. Cygilant VPM provides lean IT teams with a single-service offering that combines continuous co-managed vulnerability management with auditable patch management and security engineering support from its global SOCs (GSOC) to identify, prioritize, and patch vulnerabilities in order to reduce the attack surface, while reducing operational costs. 

“With Cygilant Vulnerability and Patch Management we are providing a valuable service to organizations that have invested in best-of-breed vulnerability management technologies from Rapid7, Qualys, and Tenable but don’t have the resources to prevent breaches from known exploitable vulnerabilities or unpatched systems,” said Chairman, President, and CEO of Cygilant, Vijay Basani. “The job of thwarting cybersecurity attacks is a 24/7/365 job. While procuring marketing-leading VM technology is a good start, unfortunately, many IT teams run lean and are constantly being asked to do more with less. As a result, an increasing number of organizations are experiencing breaches due to known exploitable vulnerabilities and missing patches.”

Cygilant Vulnerability and Patch Management is a subscription service that combines people, process, and technology to effectively detect and fix both old and new vulnerabilities and missing patches before they are successfully exploited. The VPM service includes:

· Continuous Vulnerability Scanning – Cygilant’s Global SOC team of security engineers will schedule and manage Rapid7, Qualys, and Tenable vulnerability management solutions to continuously scan IT assets to identify vulnerabilities

· Risk-based Prioritization of Vulnerabilities – Cygilant’s GSOC team will prioritize vulnerabilities based on exploitability and business risk 

· Tailored Reporting – Cygilant’s GSOC will provide daily/weekly/monthly reporting  and  guidance on reducing the attack surface, keeping all stakeholders up-to-date

· Patch Management –Cygilant’s cloud-based Patch Management service identifies, analyzes, and reports on missing patches on operating systems, including Windows, Linux, and third-party applications such as Adobe and Java.

· Auditable Change Management - auditable workflow to review, approve, schedule, apply, and validate missing patches by asset type and group

· Compliance Support -  assistance with meeting compliance requirements related to vulnerability and patch management

· Dedicated GSOC team – a dedicated Cygilant Service Delivery Manager, backed by GSOC security engineers, provides a force multiplier effect to manage vulnerability scans and patch large IT environments cost-effectively

Cygilant VPM allows organizations to combine vulnerability and patch management processes which are usually provided by multiple vendors, hindering effectiveness and resulting in disconnected data siloes. Organizations effectively utilizing vulnerability and patch management can avoid catastrophic breaches such as the recent Equifax breach that exposed sensitive data for as many as 145.5 million U.S. consumers. Equifax IT personnel failed to install an available patch for their Apache Struts web-application software which cyber criminals were then able to easily exploit.

“Had the Equifax IT team installed the appropriate patch this massive breach wouldn’t have happened. By combining vulnerability and patch management IT teams have access to a comprehensive service that continuously detects, prioritizes vulnerabilities, and patches systems while adhering to a well-defined change management process to protect customer data and financial assets, including PII and PHI,” Basani explained.


About SOCVue

Cygilant’s SOCVue® is a subscription security as a service that combines people, process, and technology to deliver a cost-effective information security program, including:

·         Managed Incident Detection

·         Managed Incident Response and Remediation Guidance

·         Proactive and Continuous Critical Security Controls Auditing

·         Managed and Co-managed SIEM & Log Management

·         Managed and Co-managed Vulnerability Management

·         Managed Patch Management

·         24x7x365 Monitoring by Trained Global SOC Security Analysts

·         Compliance Reporting

·         Auditable Change Management


About Cygilant, Inc.

Cygilant, a pioneer in hybrid security as a service, is transforming how organizations of all sizes build an enterprise-class security program. Acting as a multiplier to customers’ IT teams, Cygilant provides 24x7x365 security and compliance visibility, managed incident detection, response and remediation guidance backed by best-of-breed technology, industry best practices and global SOC analysts. Cygilant is a trusted advisor to organizations that need to proteCygilant Launches New Vulnerability and Patch Management Subscription Service to Support and Equip Lean IT Teams to Effectively Stop Cyber Threats and Exploits

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
New 'Mac-A-Mal' Tool Automates Mac Malware Hunting & Analysis
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/14/2018
Microsoft Report Details Different Forms of Cryptominers
Kelly Sheridan, Staff Editor, Dark Reading,  3/13/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.