Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

11/4/2019
10:47 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Adaptiva's Evolve VM Now Scans for Every Vulnerability in the National Vulnerability Database Within 15 Minutes

Enterprises Protected by Unmatched Speed and Scale With Industry's First Complete Life Cycle Vulnerability Management Product

SEATTLE and ORLANDO, Fla. - Nov. 4, 2019 - Adaptiva, a leading, global provider of endpoint management and security solutions for enterprise customers, today announced that it will showcase Evolve VM at Microsoft Ignite. This groundbreaking, complete vulnerability life cycle product automatically assesses endpoints for thousands of vulnerability, compliance, and health issues and instantly remediates them as soon as they are detected. Utilizing NIST's National Vulnerability Database and National Checklist Program Repository as well as hundreds of built-in custom client health checks, Evolve VM leverages Adaptiva's peer-to-peer technology to address problems with unmatched speed and scale without any impact on network performance. 

A platinum sponsor of the event, Adaptiva will be demonstrating Evolve VM in its booth, #2049, at Microsoft Ignite, Nov. 4-8, 2019, in Orlando, Florida. 

"Evolve VM sets a new standard in vulnerability management," said Deepak Kumar, founder and president of Adaptiva. "Within 15 minutes, Evolve VM can analyze tens of thousands of endpoints in the enterprise, requiring only minimal bandwidth. The product then automatically fixes the problems it finds, making the enterprise more secure and eliminating countless support tickets even before they happen." 

With its latest release, Evolve VM incorporates thousands of checks for health, compliance, and vulnerability issues on Windows systems. The product imports Security Content Automation Protocol (SCAP) content from NIST to support compliance assessments. It also integrates with NIST's Open Vulnerability Assessment Language (OVAL) rules and includes the ability to visually author new scans and remediations using the built-in graphical orchestration engine. Additionally, Evolve VM can be integrated with other systems, such as ServiceNow, enabling users to seamlessly incorporate Evolve VM into existing processes. 

Benefits of Evolve VM include: 

  • Complete Vulnerability Life Cycle Management: Unlike legacy vulnerability assessment tools that simply scan the network and generate massive "to do" lists of vulnerabilities found, Evolve VM assesses each endpoint through its agent and can automatically and immediately remediate any vulnerabilities found. 
  • Bandwidth Reduction: Because scans happen concurrently on the actual endpoints rather than running across an enterprise's network, Evolve VM dramatically reduces bandwidth usage-no throttling required. 
  • Unparalleled Scanning Speed and Scale: Adaptiva's award-winning peer-to-peer technology enables Evolve VM to complete parallel endpoint analysis hundreds of times faster than traditional VM products, covering the entire enterprise in a matter of minutes. 
  • Rapid Remediation: Through its ability to instantly contain and automatically fix vulnerabilities, Evolve VM provides more time for scarce SecOps resources to focus on other high-priority issues. 
  • No Installation Required for Existing Adaptiva Customers: Evolve VM runs on Adaptiva's Evolve platform, which means existing OneSite and Client Health customers only need a license key to get started. 

Evolve VM is able to offer these benefits based on Adaptiva's decade-long history of securely distributing software and security updates for Global 1000 enterprises. 

To see the next generation of vulnerability management in action, please visit the Adaptiva booth, #2049, at Microsoft Ignite during regular show hours. 

Can't make it to Ignite? Request a demo to learn more about Evolve VM. 

About Adaptiva 

Adaptiva is a leading, global provider of endpoint management and security solutions. The company's products, including OneSite™ and Evolve VM™, empower enterprises to manage and secure endpoints at unparalleled speed and massive scale using the power of peer-to-peer technology. Adaptiva is self-funded, highly profitable, and growing at a rapid rate. Leading global Fortune 1000 organizations, including T-Mobile, Nokia, HSBC, Walgreens, the U.S. Department of Defense, and the U.S. Department of Homeland Security, use Adaptiva products to eliminate the need for a vast IT infrastructure and automate countless endpoint management and security tasks. Learn more at https://insights.adaptiva.com, and follow the company at LinkedIn, Facebook, and Twitter

### 

OneSite and Evolve VM are trademarks of Adaptive Protocols, Inc. All other brand names and product names are trademarks or registered trademarks of their respective companies.

Tags: Adaptiva, endpoint security, endpoint management, Evolve VM, Microsoft Ignite, peer-to-peer technology, NIST, compliance, help desk, OneSite, Windows 10, vulnerability management, Windows migration

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7227
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
CVE-2019-15625
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
CVE-2019-19696
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
CVE-2019-19697
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
CVE-2019-20357
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.