Vulnerability Management

The Vulnerability Management domain helps organizations to respond faster, work more effectively, and more easily to comply with and report on SLAs.

Panaseer provides essential oversight to support controls governance and assurance. The platform automates analysis of vulnerability data combined with your unique business context. This allows you to manage vulnerabilities and controls performance more effectively.

IT operations and asset and risk owners can use near real-time analysis to handle business risks more effectively. Compliance teams get continuous oversight of controls assurance, mapped to NIST CSF and other frameworks.

Benefits

  • Validate your controls coverage.
  • Prioritize remediation of vulnerabilities based on business risk.
  • Consolidated, validated view of data from all vulnerability tools.
  • Measure performance against your SLAs, such as scan frequency and remediation frequency.
  • Measure performance against established frameworks.
  • Root cause analysis, from hot spots to data inspection.
  • Support company-wide rapid response to known zero-day exploits.

Spotlight metric

Vulnerability outlier analysis

Find and fix the small group of devices responsible for 80% of vulnerability detections exceeding your SLA.

Our vulnerability outlier analysis helps you reduce the largest number of vulnerabilities with the least effort, ensuring you’re using your remediation resources more efficiently.

Example connectors

Qualys

Tenable IO

Rapid7

Available metrics

Type
Name
Description
Diagnostic
Vulnerability detections by vulnerabilities
The number of vulnerability detections by vulnerabilities
Informational
Vulnerability detections (High Cardinality)
The number of vulnerability detections (High Cardinality)
Diagnostic
Top Ten Devices with the Most out of SLA Vulnerability Detections
The 10 devices with the most out of SLA vulnerability detections
Diagnostic
Out of SLA detections on the worst 50 devices
The out of SLA vulnerability detections on the 50 devices with highest number of out of SLA vulnerability detections
Policy
Vulnerability detections out of SLA
The number of vulnerability detections that are out of SLA
Diagnostic
Top Ten Devices with the Most Vulnerability Detections
The 10 devices with the most vulnerability detections
Diagnostic
Top Ten Unique Vulnerabilities with the Most Detections
Top ten unique vulnerabilities with the most vulnerability detections
Policy
Vulnerability detections that satisfy SLA
The number of vulnerability detections that satisfy SLA
Coverage
Vulnerability detections with SLA
The number of vulnerability detections included in SLA analysis
Informational
Vulnerability detections
The number of vulnerability detections
Policy
Devices with 80% of the total out of SLA detections (device/region)
The smallest number of devices that account for 80% of the total out of SLA vulnerability detections (device/region)
Policy
Devices with 80% of the total out of SLA detections
The smallest number of devices that account for 80% of the total out of SLA vulnerability detections
Policy
Devices with out of SLA detections
The number of devices that have out of SLA vulnerability detections
Informational
Devices with vulnerability detections
The number of devices with vulnerability detections
Informational
Unique vulnerabilities
The number of unique vulnerability signatures
Diagnostic
Average age of vulnerability detections
The average age (days since first detection on device) of vulnerability detections
Policy
New vulnerability detections in influx
The percentage of vulnerability detections that satisfy SLA
Policy
Out of SLA detections on the worst 50 devices
The percent of out of SLA vulnerability detections found on the 50 devices with highest number of out of SLA vulnerability detection
Policy
Vulnerability detections out of SLA
The percent of vulnerability detections that are out of SLA
Policy
Devices with 80% of the total out of SLA detections (device/region)
The smallest percent of devices that account for 80%of the total out of SLA vulnerability detections (device/region)
Policy
Devices with 80% of the total out of SLA detections
The smallest percent of devices that account for 80% of the total out of SLA vulnerability detections
Policy
Devices with out of SLA detections
The percent of devices with detections that have out of SLA vulnerability detections
Compound risk
Device coverage and Vulnerabilities with owner phishing tests
The number of devices with vulnerabilities and who’s owner has received a phishing test
Compound risk
Vulnerability detections with device coverage information
The number of vulnerability detections on devices (includes devices tool coverage information)
Compound risk
Vulnerability detections on devices hosting applications
The number of vulnerability detections on devices hosting an application

Device and Coverage metrics

Previous page

Endpoint Protection metrics

Next domain