SlideShare a Scribd company logo
1 of 21
www.secpod.com
Chapter 3: How to detect, assess, prioritize, and remediate
vulnerabilities using SanerNow?
THE ART OF MANAGING
AND SECURING
ENDPOINTS
SanerNow Product Series
2
Copyright © 2008 - 2021 SecPod Technologies - AUTHORISED USE ONLY
PRESENTERS
BHARATH KUMAR
KP
Lead Product Specialist
SecPod
DIXITHA S
Product Marketing Lead
SecPod
3
TODAY'S
AGENDA
Copyright © 2008 - 2021 SecPod Technologies - AUTHORISED USE ONLY
About SecPod SanerNow
Vulnerability Management (VM)
Questions and Answers
What are the OSs & Applications
SanerNow VM supports?
Top vulnerability management scenarios, a
walkthrough of SanerNow
Our home grown SCAP Feed & How
SanerNow VM works?
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
04
SanerNow Vulnerability Management
Copyright © 2008 – 2021 SecPod Technologies - AUTHORISED USE ONLY
05
SecPod’s SCAP feed, the world’s largest vulnerability
database with over 130,000+ security checks
Key metrics of SecPod SCAP Feed Total Number Supported
Total no of CVEs 127981
No of products covered across
multiple platforms
8381
SLA time for supporting critical
vulnerabilities
24 Hours
No of OSs supported 181
Copyright © 2008 - 2021 SecPod Technologies - AUTHORISED USE ONLY
6
How SanerNow Vulnerability Management works
Vulnerabilities Sync
Hosting 130,000+
vulnerability checks
Copyright © 2008 - 2021 SecPod Technologies - AUTHORISED USE ONLY
7
WHAT ARE THE OSs SUPPORTED BY SANERNOW
VM?
Linux
(Includes Redhat, CentOS,
Oracle, Ubuntu, Amazon Linux
etc.)
Windows
(All Windows versions
including Server OSs)
macOS
(All variants till macOS 10.15)
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
08
Top Vulnerability Management Scenarios and how
SanerNow simplifies it – A walkthrough of the product
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
09
Vulnerability scans are run only once in a month as they
take a long time to complete
Scenario 1
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
010
When a critical high-risk vulnerability is reported, it is
hard to detect it immediately in a network
Scenario 2
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
011
Even after running multiple scans, vulnerability detection
is not accurate
Scenario 3
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
012
During vulnerability scans it is difficult to track when a
high-risk critical vulnerability is detected
Scenario 4
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
013
Dilemma in understanding the security risks each
vulnerability possesses
Scenario 5
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
014
Stuck with a huge pile of vulnerabilities in the network and
not sure about what to remediate first
Scenario 6
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
015
There is a huge security gap between the detection and
remediation of vulnerabilities
Scenario 7
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
016
Taking the manual route for managing vulnerabilities is
daunting and time-consuming
Scenario 8
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
017
Most of the time, vulnerability details are scattered and
getting clear insights is difficult
Scenario 9
Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY
018
Bulky reports are ineffective for vulnerability
management analysis
Scenario 10
1
9
Copyright © 2008 - 2021 SecPod Technologies - AUTHORISED USE ONLY
QUESTIONS?
Copyright © 2008 - 2021 SecPod Technologies - AUTHORISED USE ONLY
20
KEEP YOUR ENDPOINTS
SECURE FROM
ATTACKERS!
TRY SANERNOW FREE
30-day unlimited access on 10 devices
2008 SecPod Founded
(Security Podium), based
in USA and India
2012 Launched SCAP Feed as
OEM service to major
security vendors, such as
AlienVault,
CloudPassage, Amazon
2016
Launched SanerNow,
a SaaS platform for
endpoint security and
management
2009 2015 2018
Released SecPod Saner 2.x
with endpoint threat detection
and response
Launched SecPod
Saner endpoint
scanning, remediation,
compliance product
Only company to host large
scale, commercial grade
SCAP content repository
SecPod is leading provider of endpoint security and management solutions. SecPod
(Security Podium, incarnated as SecPod) has created revolutionary SanerNow
platform and tools that are used by MSPs and enterprises worldwide. SecPod also
licenses security technology to top security vendors through its SCAP Content
Professional Feed.
ABOUT
For enquiries, contact us at: Email: info@secpod.com | Tech Support: support@secpod.com
Phone: (+1) 918 625 3023 (US) | (+91) 80 4121 4020 (IN)

More Related Content

Similar to How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
How to effectively monitor and manage IT assets in real-time using SanerNow
How to effectively monitor and manage IT assets in real-time using SanerNowHow to effectively monitor and manage IT assets in real-time using SanerNow
How to effectively monitor and manage IT assets in real-time using SanerNowSecPod
 
Uncovering Vulnerabilities Beyond Software Vulnerabilities
Uncovering Vulnerabilities Beyond Software VulnerabilitiesUncovering Vulnerabilities Beyond Software Vulnerabilities
Uncovering Vulnerabilities Beyond Software VulnerabilitiesSecPod
 
Annual Vulnerability Report Insights - 2022
Annual Vulnerability Report Insights - 2022Annual Vulnerability Report Insights - 2022
Annual Vulnerability Report Insights - 2022SecPod
 
How to Achieve NIST Compliance using SanerNow?
How to Achieve NIST Compliance using SanerNow?How to Achieve NIST Compliance using SanerNow?
How to Achieve NIST Compliance using SanerNow?SecPod
 
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...Kevin Fealey
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBECristian Garcia G.
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check PointHarry Gunns
 
Security automation architecture principles for effective vulnerability manag...
Security automation architecture principles for effective vulnerability manag...Security automation architecture principles for effective vulnerability manag...
Security automation architecture principles for effective vulnerability manag...SecPod
 
AWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWSAWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWSEric Smalling
 
Uncover Vulnerabilities Beyond Software Vulnerabilities
Uncover Vulnerabilities Beyond Software VulnerabilitiesUncover Vulnerabilities Beyond Software Vulnerabilities
Uncover Vulnerabilities Beyond Software VulnerabilitiesSecPod
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpointe-Xpert Solutions SA
 
AWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSAWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSEric Smalling
 
PIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINTPIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINTTechnofutur TIC
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mwaresolarisyourep
 

Similar to How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow? (20)

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
How to effectively monitor and manage IT assets in real-time using SanerNow
How to effectively monitor and manage IT assets in real-time using SanerNowHow to effectively monitor and manage IT assets in real-time using SanerNow
How to effectively monitor and manage IT assets in real-time using SanerNow
 
Uncovering Vulnerabilities Beyond Software Vulnerabilities
Uncovering Vulnerabilities Beyond Software VulnerabilitiesUncovering Vulnerabilities Beyond Software Vulnerabilities
Uncovering Vulnerabilities Beyond Software Vulnerabilities
 
Annual Vulnerability Report Insights - 2022
Annual Vulnerability Report Insights - 2022Annual Vulnerability Report Insights - 2022
Annual Vulnerability Report Insights - 2022
 
How to Achieve NIST Compliance using SanerNow?
How to Achieve NIST Compliance using SanerNow?How to Achieve NIST Compliance using SanerNow?
How to Achieve NIST Compliance using SanerNow?
 
Security architecture proposal template
Security architecture proposal templateSecurity architecture proposal template
Security architecture proposal template
 
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
 
Why Check Point - Moti Sagey
Why Check Point - Moti SageyWhy Check Point - Moti Sagey
Why Check Point - Moti Sagey
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
 
Making Network Security Relevant
Making Network Security RelevantMaking Network Security Relevant
Making Network Security Relevant
 
Security automation architecture principles for effective vulnerability manag...
Security automation architecture principles for effective vulnerability manag...Security automation architecture principles for effective vulnerability manag...
Security automation architecture principles for effective vulnerability manag...
 
AWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWSAWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWS
 
Uncover Vulnerabilities Beyond Software Vulnerabilities
Uncover Vulnerabilities Beyond Software VulnerabilitiesUncover Vulnerabilities Beyond Software Vulnerabilities
Uncover Vulnerabilities Beyond Software Vulnerabilities
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpoint
 
AWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSAWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWS
 
PIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINTPIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINT
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 

More from SecPod

Cybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionCybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionSecPod
 
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedClosing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedSecPod
 
Align Your ITSM and SecOps Strategy for Unstoppable IT
Align Your ITSM and SecOps Strategy for Unstoppable ITAlign Your ITSM and SecOps Strategy for Unstoppable IT
Align Your ITSM and SecOps Strategy for Unstoppable ITSecPod
 
ProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptx
ProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptxProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptx
ProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptxSecPod
 
Cybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionCybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionSecPod
 
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedClosing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedSecPod
 

More from SecPod (6)

Cybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionCybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface Reduction
 
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedClosing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
 
Align Your ITSM and SecOps Strategy for Unstoppable IT
Align Your ITSM and SecOps Strategy for Unstoppable ITAlign Your ITSM and SecOps Strategy for Unstoppable IT
Align Your ITSM and SecOps Strategy for Unstoppable IT
 
ProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptx
ProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptxProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptx
ProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptx
 
Cybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionCybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface Reduction
 
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedClosing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?

  • 1. www.secpod.com Chapter 3: How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow? THE ART OF MANAGING AND SECURING ENDPOINTS SanerNow Product Series
  • 2. 2 Copyright © 2008 - 2021 SecPod Technologies - AUTHORISED USE ONLY PRESENTERS BHARATH KUMAR KP Lead Product Specialist SecPod DIXITHA S Product Marketing Lead SecPod
  • 3. 3 TODAY'S AGENDA Copyright © 2008 - 2021 SecPod Technologies - AUTHORISED USE ONLY About SecPod SanerNow Vulnerability Management (VM) Questions and Answers What are the OSs & Applications SanerNow VM supports? Top vulnerability management scenarios, a walkthrough of SanerNow Our home grown SCAP Feed & How SanerNow VM works?
  • 4. Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY 04 SanerNow Vulnerability Management
  • 5. Copyright © 2008 – 2021 SecPod Technologies - AUTHORISED USE ONLY 05 SecPod’s SCAP feed, the world’s largest vulnerability database with over 130,000+ security checks Key metrics of SecPod SCAP Feed Total Number Supported Total no of CVEs 127981 No of products covered across multiple platforms 8381 SLA time for supporting critical vulnerabilities 24 Hours No of OSs supported 181
  • 6. Copyright © 2008 - 2021 SecPod Technologies - AUTHORISED USE ONLY 6 How SanerNow Vulnerability Management works Vulnerabilities Sync Hosting 130,000+ vulnerability checks
  • 7. Copyright © 2008 - 2021 SecPod Technologies - AUTHORISED USE ONLY 7 WHAT ARE THE OSs SUPPORTED BY SANERNOW VM? Linux (Includes Redhat, CentOS, Oracle, Ubuntu, Amazon Linux etc.) Windows (All Windows versions including Server OSs) macOS (All variants till macOS 10.15)
  • 8. Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY 08 Top Vulnerability Management Scenarios and how SanerNow simplifies it – A walkthrough of the product
  • 9. Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY 09 Vulnerability scans are run only once in a month as they take a long time to complete Scenario 1
  • 10. Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY 010 When a critical high-risk vulnerability is reported, it is hard to detect it immediately in a network Scenario 2
  • 11. Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY 011 Even after running multiple scans, vulnerability detection is not accurate Scenario 3
  • 12. Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY 012 During vulnerability scans it is difficult to track when a high-risk critical vulnerability is detected Scenario 4
  • 13. Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY 013 Dilemma in understanding the security risks each vulnerability possesses Scenario 5
  • 14. Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY 014 Stuck with a huge pile of vulnerabilities in the network and not sure about what to remediate first Scenario 6
  • 15. Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY 015 There is a huge security gap between the detection and remediation of vulnerabilities Scenario 7
  • 16. Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY 016 Taking the manual route for managing vulnerabilities is daunting and time-consuming Scenario 8
  • 17. Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY 017 Most of the time, vulnerability details are scattered and getting clear insights is difficult Scenario 9
  • 18. Copyright © 2008 - 2020 SecPod Technologies - AUTHORISED USE ONLY 018 Bulky reports are ineffective for vulnerability management analysis Scenario 10
  • 19. 1 9 Copyright © 2008 - 2021 SecPod Technologies - AUTHORISED USE ONLY QUESTIONS?
  • 20. Copyright © 2008 - 2021 SecPod Technologies - AUTHORISED USE ONLY 20 KEEP YOUR ENDPOINTS SECURE FROM ATTACKERS! TRY SANERNOW FREE 30-day unlimited access on 10 devices
  • 21. 2008 SecPod Founded (Security Podium), based in USA and India 2012 Launched SCAP Feed as OEM service to major security vendors, such as AlienVault, CloudPassage, Amazon 2016 Launched SanerNow, a SaaS platform for endpoint security and management 2009 2015 2018 Released SecPod Saner 2.x with endpoint threat detection and response Launched SecPod Saner endpoint scanning, remediation, compliance product Only company to host large scale, commercial grade SCAP content repository SecPod is leading provider of endpoint security and management solutions. SecPod (Security Podium, incarnated as SecPod) has created revolutionary SanerNow platform and tools that are used by MSPs and enterprises worldwide. SecPod also licenses security technology to top security vendors through its SCAP Content Professional Feed. ABOUT For enquiries, contact us at: Email: info@secpod.com | Tech Support: support@secpod.com Phone: (+1) 918 625 3023 (US) | (+91) 80 4121 4020 (IN)