Shavlik Rolls Out 5.8
Shavlik Technologies announced the general availability of Shavlik NetChk Protect 5.8
ST. PAUL, Minn. -- Continuing its drive to simplify complex network security and help customers meet their compliance goals, Shavlik Technologies today announced the general availability of Shavlik NetChk™ Protect 5.8, representing the industry’s first holistic approach to enterprise vulnerability management. This new release incorporates Active Vulnerability Management™ to automatically detect and prevent organizations from “security posture drift,” by continually assessing and remediating both configuration-based and software-based vulnerabilities.
Through ongoing feedback from Shavlik’s extensive customer base of over 7,000 organizations, the company recognized a growing need within the enterprise, driven by compliance and risk management demands, to tighten control and centralize policies for all devices across the network – with the flexibility required by highly distributed environments. So Shavlik designed version 5.8 to ARM enterprise customers with a simpler way to automatically and continuously Assess, Remediate and Manage security vulnerabilities, and maintain this control network wide.
“When considering the enterprise wide compliance management problem, companies are increasingly considering security a key enabler to mitigate risk and limit vulnerabilities in a simpler, more automated fashion. Merely reacting to problems by patching is not enough as organizations continue to globalize and key assets become further distributed,” said Charles J. Kolodgy, research director, Security Products, IDC. “Shavlik has taken a proactive stand with their ARM approach to vulnerability management. For enterprises to get the whole picture they need to always take corporate compliance into account, organizations need to be able to easily perform Assessment, Remediation, and Management in a repeatable, consistent, and accountable way.”
About the Author(s)
You May Also Like
Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024Why Effective Asset Management is Critical to Enterprise Cybersecurity
May 21, 2024Finding Your Way on the Path to Zero Trust
May 22, 2024Extending Access Management: Securing Access for all Identities, Devices, and Applications
June 4, 2024Assessing Software Supply Chain Risk
June 6, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024