0% found this document useful (0 votes)
67 views2 pages

Sectrio PB Vulnerability Management

The document is a product brief for Sectrio's Vulnerability Management solution. It describes the solution's ability to: 1) Continuously discover assets connected to networks, ensuring accurate inventory without requiring agents. 2) Identify attributes of discovered devices and map underlying vulnerabilities to highlight risks. 3) Discover assets using passive monitoring or active probing to retrieve additional device details like firmware and vulnerabilities. 4) Integrate with other systems to control access and remediate identified risks.

Uploaded by

suneetha.alluri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views2 pages

Sectrio PB Vulnerability Management

The document is a product brief for Sectrio's Vulnerability Management solution. It describes the solution's ability to: 1) Continuously discover assets connected to networks, ensuring accurate inventory without requiring agents. 2) Identify attributes of discovered devices and map underlying vulnerabilities to highlight risks. 3) Discover assets using passive monitoring or active probing to retrieve additional device details like firmware and vulnerabilities. 4) Integrate with other systems to control access and remediate identified risks.

Uploaded by

suneetha.alluri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

PRODUCT BRIEF

SECTRIO
VULNERABILITY
MANAGEMENT
The Sectrio Vulnerability Management Solution delivers
unmatched visibility into managed and unmanaged assets
and the associated vulnerabilities of those devices.

Discover Assess Report Mitigate

Identify and mitigate critical risks in IT-OT Challenges


and IoT Asset Visibility and Risk Management

Continuous discovery of assets


Limited Visibility
See assets the instant they connect to the network,
ensuring accurate and up-to-date inventory.
Cybersecurity starts with assets that you can
see. What converged networks need is an
Agentless
extended eye to view beyond the organization
No agents need to be installed on the end devices or assets into their extended enterprise - data
at the edge to discover, assess, report, or mitigate. centres, internet of things, control networks
and its operational technology assets. Without
Asset Intelligence asset visibility organizations cannot manage
assets effectively, the cyber security teams
OT & IoT device support with more than 40,000 asset
cannot control access to the network, perform
types and platforms that can identify your extended
network segregation and micro segmentation,
enterprise assets. ensure industry compliances, or even respond
to incidents in a timely manner.
Complete Asset Transparency
Discovers managed and unmanaged assets, wired
and wireless assets, on or off the network premises. Risks and Gaps

Multiple Authentication methods supported Once you see assets on your converged
802.1X and non-802.1X authentication support to networks you need to know how secure they
are. Risks and gaps must be identified and
discover a wide range of assets on today’s complex
plugged in a timely manner and in the order of
converged networks.
priority. This is important as security teams can
ensure the organization is meeting the security
objectives of the executive team, which
Sectrio includes the protection of sensitive data.
Broadening security assessments, postures,
Vulnerability Management and policies to include operational technology,
internet of things and production machines, as
well as the underlying infrastructure they
The Vulnerability Management module discovers
connect to, ensures personal safety,
assets/devices within the IT-OT and IoT networks, Identifies unimpeded operations and protection of
attributes of the device identified, maps the underlying sensitive production information.
vulnerabilities, and highlights the risks and Edgetech

Confidential and Proprietary www.sectrio.com 01


Appliances collect network information for each asset in Vulnerability Management module can integrate with a
the network or segment it is installed in. Some examples Privilege Access Management (PAM) or Active Directory
of the data collected. system to control the access to the device. With Smart
Probing the following attributes over and above the
This data is then transferred to the Hub from each
ones discovered through Passive Scan are discovered.
appliance. The Hub collates the data, verifies if there are
Firmware, Firmware Version, Firmware CVEs
any changes as compare to the last Vulnerability Scan
from the appliance and then queries Sectrio’s update Smart Probing - Key Parameters

center against the centrally managed database. If a


40,000+ platforms (there could be
device is not found in the database an alert is triggered Central Device
multiple entries for each platform
to Sectrio’s threat research team, who will then collect all Database
corresponding to firmware versions.
the logs and manually identify the device and update the
database. The module can be configured to collect IT, IoT, OT, Industrial, Utilities,
Device
device information using two methods. Critical Infrastructure, Oil and Gas
Domains
and Medical
Passive Discovery
Analyze converged networks traffic through a span port CVE listing
cve.mitre.org
source
or tap to identify endpoints and traffic patterns while
creating no additional network traffic and has virtually Configurable (default 1 a day)
Scan interval
no risk of disrupting critical processes by interacting
directly with endpoints. Passive scan identifies some or
all of the following attributes of the device: Device
Name, IP, MAC address, VLAN, Manufacturer, End of Life Benefits
(EOL), End of Service (EOS), Device Image, known CVE list
for the Device.
Discover
Identify and list assets/devices within your IT-OT network
(managed and unmanaged devices) with device finger
printing, details and more.

Assess
Evaluate devices to determine, users, system configuration,
applications, presence of security agents and more.

Report
Smart Probing Analyze asset and device status and calculate risk scores
Smart Probing is deployed when information regarding with critical asset risk index techniques. Compare assets at
the device such as the exact firmware and the CVE risks to similar assets in our asset intelligence database
specific to the device and the firmware. Smart Probing is
done by accessing the device and querying it for Mitigate
parameters, depending on the type of the device this Resolve risks with recommendations provided to triage
querying could occur using telnet, SNMP, CLI, etc. The the risks and work with vendors on patch management.

About Us

Sectrio is a division of Subex Digital LLP, a wholly owned subsidiary of Subex Limited. Global Offices:
Sectrio is a market and technology leader in the Internet of Things (IoT), Operational India, Americas,
Technology (OT) and 5G Cybersecurity segments. We excel in securing the most critical Europe, Asia Pecific
Middle East & Africa.
assets, data, networks, supply chains, and device architectures across geographies and
@sectrio
scale on a single platform. Sectrio today runs the largest IoT and OT focused threat
intelligence gathering facility in the world. To learn more visit: www.sectrio.com Sectrio
Confidential and Proprietary www.sectrio.com 02

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy