Internal and external coordination is simplified through an overall risk remediation workflow within the Cockpit and a messaging / feedback system for the communication with the Intelligence Team.
The business process risk view presents the current threats of the IT security flaws to business processes. For example, a server with several vulnerabilities is not only a threat to the IT infrastructure, but also to the IT services provided by the server. Employees might be unable to send and receive emails, web portals are inaccessible or the ERP system is interrupted. Thus communication by email becomes impossible, incoming orders via the web portal are not received or new stock levels cannot be entered in the ERP system. The presentation of IT risks and their influences on IT services and business processes in turn demonstrates clearly and understandably the effects and the overall context at the push of a button.
Asset management functionalities provide an overview about what is really running in the network, from perimeter and corporate network to virtualised machines and cloud services. Unexpected access points, web servers and other devices that may leave a network open to attack are uncovered. Operating systems of each device are identified, open networks ports are found, active services on those ports are determined and crucial information about installed certificates is itemised. Assets are tagged according to a wide range of attributes such as network address, open ports, OS, installed software, found vulnerabilities and a multitude of others to allow automatic selection of hosts for scanning or reporting.