Shavlik Rolls Out 5.8Shavlik Rolls Out 5.8
Shavlik Technologies announced the general availability of Shavlik NetChk Protect 5.8
November 7, 2006

ST. PAUL, Minn. -- Continuing its drive to simplify complex network security and help customers meet their compliance goals, Shavlik Technologies today announced the general availability of Shavlik NetChk™ Protect 5.8, representing the industry’s first holistic approach to enterprise vulnerability management. This new release incorporates Active Vulnerability Management™ to automatically detect and prevent organizations from “security posture drift,” by continually assessing and remediating both configuration-based and software-based vulnerabilities.
Through ongoing feedback from Shavlik’s extensive customer base of over 7,000 organizations, the company recognized a growing need within the enterprise, driven by compliance and risk management demands, to tighten control and centralize policies for all devices across the network – with the flexibility required by highly distributed environments. So Shavlik designed version 5.8 to ARM enterprise customers with a simpler way to automatically and continuously Assess, Remediate and Manage security vulnerabilities, and maintain this control network wide. “When considering the enterprise wide compliance management problem, companies are increasingly considering security a key enabler to mitigate risk and limit vulnerabilities in a simpler, more automated fashion. Merely reacting to problems by patching is not enough as organizations continue to globalize and key assets become further distributed,” said Charles J. Kolodgy, research director, Security Products, IDC. “Shavlik has taken a proactive stand with their ARM approach to vulnerability management. For enterprises to get the whole picture they need to always take corporate compliance into account, organizations need to be able to easily perform Assessment, Remediation, and Management in a repeatable, consistent, and accountable way.” Shavlik Technologies
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023