Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

10/25/2017
11:55 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Cygilant Launches New Vulnerability and Patch Management Subscription Service

Cygilant's Industry-first 'One Vendor' Approach to Vulnerability and Patch Management Aims to Streamline Workflows; Speeding Cyber Threat Response Times and Lowering Cost of Ownership

Boston, Mass., October 24, 2017 - Cygilant (formerly EiQ Networks), a pioneer in hybrid security as a service, today launched a new combined vulnerability and patch management (VPM) subscription service.  This industry-first approach to vulnerability and patch management is now available to companies that have invested in Qualys, Rapid7, and Tenable vulnerability management technologies. Cygilant VPM provides lean IT teams with a single-service offering that combines continuous co-managed vulnerability management with auditable patch management and security engineering support from its global SOCs (GSOC) to identify, prioritize, and patch vulnerabilities in order to reduce the attack surface, while reducing operational costs. 

“With Cygilant Vulnerability and Patch Management we are providing a valuable service to organizations that have invested in best-of-breed vulnerability management technologies from Rapid7, Qualys, and Tenable but don’t have the resources to prevent breaches from known exploitable vulnerabilities or unpatched systems,” said Chairman, President, and CEO of Cygilant, Vijay Basani. “The job of thwarting cybersecurity attacks is a 24/7/365 job. While procuring marketing-leading VM technology is a good start, unfortunately, many IT teams run lean and are constantly being asked to do more with less. As a result, an increasing number of organizations are experiencing breaches due to known exploitable vulnerabilities and missing patches.”

Cygilant Vulnerability and Patch Management is a subscription service that combines people, process, and technology to effectively detect and fix both old and new vulnerabilities and missing patches before they are successfully exploited. The VPM service includes:

· Continuous Vulnerability Scanning – Cygilant’s Global SOC team of security engineers will schedule and manage Rapid7, Qualys, and Tenable vulnerability management solutions to continuously scan IT assets to identify vulnerabilities

· Risk-based Prioritization of Vulnerabilities – Cygilant’s GSOC team will prioritize vulnerabilities based on exploitability and business risk 

· Tailored Reporting – Cygilant’s GSOC will provide daily/weekly/monthly reporting  and  guidance on reducing the attack surface, keeping all stakeholders up-to-date

· Patch Management –Cygilant’s cloud-based Patch Management service identifies, analyzes, and reports on missing patches on operating systems, including Windows, Linux, and third-party applications such as Adobe and Java.

· Auditable Change Management - auditable workflow to review, approve, schedule, apply, and validate missing patches by asset type and group

· Compliance Support -  assistance with meeting compliance requirements related to vulnerability and patch management

· Dedicated GSOC team – a dedicated Cygilant Service Delivery Manager, backed by GSOC security engineers, provides a force multiplier effect to manage vulnerability scans and patch large IT environments cost-effectively

Cygilant VPM allows organizations to combine vulnerability and patch management processes which are usually provided by multiple vendors, hindering effectiveness and resulting in disconnected data siloes. Organizations effectively utilizing vulnerability and patch management can avoid catastrophic breaches such as the recent Equifax breach that exposed sensitive data for as many as 145.5 million U.S. consumers. Equifax IT personnel failed to install an available patch for their Apache Struts web-application software which cyber criminals were then able to easily exploit.

“Had the Equifax IT team installed the appropriate patch this massive breach wouldn’t have happened. By combining vulnerability and patch management IT teams have access to a comprehensive service that continuously detects, prioritizes vulnerabilities, and patches systems while adhering to a well-defined change management process to protect customer data and financial assets, including PII and PHI,” Basani explained.

 

About SOCVue

Cygilant’s SOCVue® is a subscription security as a service that combines people, process, and technology to deliver a cost-effective information security program, including:

·         Managed Incident Detection

·         Managed Incident Response and Remediation Guidance

·         Proactive and Continuous Critical Security Controls Auditing

·         Managed and Co-managed SIEM & Log Management

·         Managed and Co-managed Vulnerability Management

·         Managed Patch Management

·         24x7x365 Monitoring by Trained Global SOC Security Analysts

·         Compliance Reporting

·         Auditable Change Management

 

About Cygilant, Inc.

Cygilant, a pioneer in hybrid security as a service, is transforming how organizations of all sizes build an enterprise-class security program. Acting as a multiplier to customers’ IT teams, Cygilant provides 24x7x365 security and compliance visibility, managed incident detection, response and remediation guidance backed by best-of-breed technology, industry best practices and global SOC analysts. Cygilant is a trusted advisor to organizations that need to proteCygilant Launches New Vulnerability and Patch Management Subscription Service to Support and Equip Lean IT Teams to Effectively Stop Cyber Threats and Exploits

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
A Lawyer's Guide to Cyber Insurance: 4 Basic Tips
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC,  7/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13575
PUBLISHED: 2019-07-18
A SQL injection vulnerability exists in WPEverest Everest Forms plugin for WordPress through 1.4.9. Successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary SQL commands on the affected system via includes/evf-entry-functions.php
CVE-2019-13607
PUBLISHED: 2019-07-18
The Opera Mini application through 16.0.14 for iOS has a UXSS vulnerability that can be triggered by performing navigation to a javascript: URL.
CVE-2019-13915
PUBLISHED: 2019-07-18
b3log Wide before 1.6.0 allows three types of attacks to access arbitrary files. First, the attacker can write code in the editor, and compile and run it approximately three times to read an arbitrary file. Second, the attacker can create a symlink, and then place the symlink into a ZIP archive. An ...
CVE-2019-9230
PUBLISHED: 2019-07-18
An issue was discovered on AudioCodes Mediant 500L-MSBR, 500-MBSR, M800B-MSBR and 800C-MSBR devices with firmware versions F7.20A to F7.20A.253. A cross-site scripting (XSS) vulnerability in the search function of the management web interface allows remote attackers to inject arbitrary web script or...
CVE-2019-10100
PUBLISHED: 2019-07-18
Lawrence Livermore National Laboratory msr-safe v1.1.0 is affected by: Incorrect Access Control. The impact is: An attacker could modify model specific registers. The component is: ioctl handling. The attack vector is: An attacker could exploit a bug in ioctl interface whitelist checking, in order t...