Top 5 Emerging Vulnerability Management Solutions for Q1 2017

  • Vulnerability Management Solutions helps to prioritize and remediate vulnerabilities by consolidating data from multiple vulnerability scanning tools (Network VA, DAST etc.). It correlate and help to prioritize the risk (some do this by integrations with Threat Feeds, Asset Priority / tagging etc.) posed by the vulnerabilities to prioritize remediation efforts. They may NOT have native scanning capabilities and rely on scan data from third party tools. This platform Recommended for organisations using multiple scanning tools who want to streamline their vulnerability Management process.


Kenna Security

  • Kenna Security’s approach to threat and vulnerability management integrates the results of vulnerability scan data from Qualys, Nessus, Rapid 7, and dozens more with the results from 8 different threat feeds. The result? You know what vulnerabilities need to be prioritized in order to improve your company’s security posture. Then you can report on your team’s activity, showing the impact of your remediation. No one will doubt your work—or effectiveness.
  • To know more visit: Kenna Security Product page


Core Security

  • Core Security Vulnerability Insight (formerly Core Insight) unifies, regulates, and prioritizes vulnerability management initiatives enterprise-wide. Consolidating multiple vulnerability scans across vendors, while matching known exploits and simulating attacks, enables you to focus on the most vulnerable points of your network. With greater scalability and advanced attack path analytics, Core Insight helps you to accurately identify the vulnerabilities that pose the greatest threat to critical business assets, regardless of the size and complexity of your IT landscape. Once critical vulnerabilities are prioritized, you can move quickly to remediate the threat in your systems.


Skybox Security

  • Skybox™ Vulnerability Control supports a systematic, focused approach to vulnerability management to deliver intelligent risk reduction unlike any other vendor. With total attack surface visibility and continuous threat intelligence, Vulnerability Control analyzes risk in the context of your vulnerabilities, your network and exploits in the wild.
  • To know more visit: Skybox Vulnerability Control Product Page



  • Tennable Family manages and analyzes vulnerability data across the organization, prioritizes security risks and provides automated frameworks and compliance reporting. With continuous monitoring, security teams can measure and visualize the effectiveness of the security program using SecurityCenter’s pre-built, highly customizable dashboards and reports and the industry’s only Assurance Report Cards. It also is the first Cyber Exposure platform to provide visibility into any asset on any computing platform. It enables security teams and executives to manage vulnerabilities and risks across the entire attack surface with confidence. Built on the leading Nessus technology from Tenable.
  • To Know more visit: Tenable (, Security Center Continuous view) Product Page


Denim Group

  • Denim’s ThreadFix is the industry leading vulnerability resolution platform that provides a window into the state of application security programs for organizations that build software. ThreadFix works for only applications and correlate vulnerabilities.
  • To know more visit: Denim Group Threadfix Product Page

Views: 101

Join the Discussion ...

You need to be a member of CISO Platform to join the discussion!

Join CISO Platform



CISO as an enabler

Started by Maheshkumar Vagadiya Jul 30. 0 Replies

Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue

Has Anyone Evaluated Digital Signature (like Docusign)?

Started by CISO Platform. Last reply by SACHIN BP SHETTY Apr 24. 1 Reply

(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue

What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?

Started by CISO Platform. Last reply by ANAND SHRIMALI May 20. 4 Replies

(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue

[Please Suggest] Corona Virus: Security advisory for work from home

Started by CISO Platform. Last reply by Bhushan Deo Mar 20. 12 Replies

(question posted on behalf of a CISO member)Due to CORONA virus most of the organizations are allowing their employees to work form home.Has any one issued security advisory for work from home ?Continue

Tags: #COVID19

Follow us

Contact Us


Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service