Centennial Unveils ToolCentennial Unveils Tool
Centennial Software, developer of IT asset discovery and endpoint security solutions, today announced the availability of Security.Advisor
November 13, 2006
PORTLAND, Ore. -- Centennial Software, developer of IT asset discovery and endpoint security solutions, today announced the availability of Security.Advisor, a comprehensive new solution for detecting and prioritizing network software and firmware vulnerabilities. With Security.Advisor, Centennial sets a new bar for effective governance of the IT estate by combining 100 percent network discovery with vulnerability assessment, ensuring that vulnerability scans are performed on all machines for total network protection.
Vulnerabilities identified by Security.Advisor can take many forms such as greynet applications (unwanted games, P2P applications, hacking tools, etc.) and software and firmware not on the latest patch. By comparing the live information in Centennial Discovery's asset repository against a comprehensive database of known threats, Security.Advisor helps administrators pinpoint risks down to individual PCs and devices.
"Addressing the problem of network vulnerability begins with an accurate and up to date awareness of the hardware and software on your network," said Andy Burton, CEO of Centennial Software. "With Security.Advisor, Centennial Software is helping companies make intelligent security decisions about the massive amount of software on their network by highlighting risky applications. It's about enabling effective governance of the IT estate and security is a key component of that."
Available as an add-on component to Centennial Discovery 2006 Feature Pack
Read more about:2006
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
AI in Cybersecurity: Using artificial intelligence to mitigate emerging security risks
Protecting Critical Infrastructure: The 2021 Energy, Utilities, and Industrials Cyber Threat Landscape Report
Business Buyers Guide to Password Managers