Vulnerabilities / Threats

10/25/2017
11:55 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Cygilant Launches New Vulnerability and Patch Management Subscription Service

Cygilant's Industry-first 'One Vendor' Approach to Vulnerability and Patch Management Aims to Streamline Workflows; Speeding Cyber Threat Response Times and Lowering Cost of Ownership

Boston, Mass., October 24, 2017 - Cygilant (formerly EiQ Networks), a pioneer in hybrid security as a service, today launched a new combined vulnerability and patch management (VPM) subscription service.  This industry-first approach to vulnerability and patch management is now available to companies that have invested in Qualys, Rapid7, and Tenable vulnerability management technologies. Cygilant VPM provides lean IT teams with a single-service offering that combines continuous co-managed vulnerability management with auditable patch management and security engineering support from its global SOCs (GSOC) to identify, prioritize, and patch vulnerabilities in order to reduce the attack surface, while reducing operational costs. 

“With Cygilant Vulnerability and Patch Management we are providing a valuable service to organizations that have invested in best-of-breed vulnerability management technologies from Rapid7, Qualys, and Tenable but don’t have the resources to prevent breaches from known exploitable vulnerabilities or unpatched systems,” said Chairman, President, and CEO of Cygilant, Vijay Basani. “The job of thwarting cybersecurity attacks is a 24/7/365 job. While procuring marketing-leading VM technology is a good start, unfortunately, many IT teams run lean and are constantly being asked to do more with less. As a result, an increasing number of organizations are experiencing breaches due to known exploitable vulnerabilities and missing patches.”

Cygilant Vulnerability and Patch Management is a subscription service that combines people, process, and technology to effectively detect and fix both old and new vulnerabilities and missing patches before they are successfully exploited. The VPM service includes:

· Continuous Vulnerability Scanning – Cygilant’s Global SOC team of security engineers will schedule and manage Rapid7, Qualys, and Tenable vulnerability management solutions to continuously scan IT assets to identify vulnerabilities

· Risk-based Prioritization of Vulnerabilities – Cygilant’s GSOC team will prioritize vulnerabilities based on exploitability and business risk 

· Tailored Reporting – Cygilant’s GSOC will provide daily/weekly/monthly reporting  and  guidance on reducing the attack surface, keeping all stakeholders up-to-date

· Patch Management –Cygilant’s cloud-based Patch Management service identifies, analyzes, and reports on missing patches on operating systems, including Windows, Linux, and third-party applications such as Adobe and Java.

· Auditable Change Management - auditable workflow to review, approve, schedule, apply, and validate missing patches by asset type and group

· Compliance Support -  assistance with meeting compliance requirements related to vulnerability and patch management

· Dedicated GSOC team – a dedicated Cygilant Service Delivery Manager, backed by GSOC security engineers, provides a force multiplier effect to manage vulnerability scans and patch large IT environments cost-effectively

Cygilant VPM allows organizations to combine vulnerability and patch management processes which are usually provided by multiple vendors, hindering effectiveness and resulting in disconnected data siloes. Organizations effectively utilizing vulnerability and patch management can avoid catastrophic breaches such as the recent Equifax breach that exposed sensitive data for as many as 145.5 million U.S. consumers. Equifax IT personnel failed to install an available patch for their Apache Struts web-application software which cyber criminals were then able to easily exploit.

“Had the Equifax IT team installed the appropriate patch this massive breach wouldn’t have happened. By combining vulnerability and patch management IT teams have access to a comprehensive service that continuously detects, prioritizes vulnerabilities, and patches systems while adhering to a well-defined change management process to protect customer data and financial assets, including PII and PHI,” Basani explained.

 

About SOCVue

Cygilant’s SOCVue® is a subscription security as a service that combines people, process, and technology to deliver a cost-effective information security program, including:

·         Managed Incident Detection

·         Managed Incident Response and Remediation Guidance

·         Proactive and Continuous Critical Security Controls Auditing

·         Managed and Co-managed SIEM & Log Management

·         Managed and Co-managed Vulnerability Management

·         Managed Patch Management

·         24x7x365 Monitoring by Trained Global SOC Security Analysts

·         Compliance Reporting

·         Auditable Change Management

 

About Cygilant, Inc.

Cygilant, a pioneer in hybrid security as a service, is transforming how organizations of all sizes build an enterprise-class security program. Acting as a multiplier to customers’ IT teams, Cygilant provides 24x7x365 security and compliance visibility, managed incident detection, response and remediation guidance backed by best-of-breed technology, industry best practices and global SOC analysts. Cygilant is a trusted advisor to organizations that need to proteCygilant Launches New Vulnerability and Patch Management Subscription Service to Support and Equip Lean IT Teams to Effectively Stop Cyber Threats and Exploits

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
Most Malware Arrives Via Email
Dark Reading Staff 10/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17534
PUBLISHED: 2018-10-15
Teltonika RUT9XX routers with firmware before 00.04.233 provide a root terminal on a serial interface without proper access control. This allows attackers with physical access to execute arbitrary commands with root privileges.
CVE-2018-17980
PUBLISHED: 2018-10-15
NoMachine before 5.3.27 and 6.x before 6.3.6 allows attackers to gain privileges via a Trojan horse wintab32.dll file located in the same directory as a .nxs file, as demonstrated by a scenario where the .nxs file and the DLL are in the current working directory, and the Trojan horse code is execute...
CVE-2018-18259
PUBLISHED: 2018-10-15
Stored XSS has been discovered in version 1.0.12 of the LUYA CMS software via /admin/api-cms-nav/create-page.
CVE-2018-18260
PUBLISHED: 2018-10-15
In the 2.4 version of Camaleon CMS, Stored XSS has been discovered. The profile image in the User settings section can be run in the update / upload area via /admin/media/upload?actions=false.
CVE-2018-17532
PUBLISHED: 2018-10-15
Teltonika RUT9XX routers with firmware before 00.04.233 are prone to multiple unauthenticated OS command injection vulnerabilities in autologin.cgi and hotspotlogin.cgi due to insufficient user input sanitization. This allows remote attackers to execute arbitrary commands with root privileges.