RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Awillix Continuous Vulnerability Monitoring (CVM)

Product
Developers: Awillix (Avillix)
Technology: SaaS - Software as a service,  TMS - Test Management System

Main article: SaaS - History. Philosophy. Development drivers

Continuous Vulnerability Monitoring (CVM) provides continuous monitoring of vulnerabilities.

2022: CVM Functionality

According to information for October 2022, CVM is a Solution SaaS allows you to test infrastructure and applications in 24/7 mode, inventory services, prioritize risks and build analytics.

Modules

The client can flexibly connect or disable the necessary CVM functionality and adjust the frequency of its use, since the product is modular.

Module 1. Continuous inventory of external IT perimeter

The module is responsible for continuous 24/7 monitoring of publishing, services and services on the external perimeter.

The external perimeter is scanned to determine:

  • Active hosts;
  • Open services;
  • Service versions;
  • New domain names.

The built-in analytics module allows you to analyze:

  • Dynamics of the change: which hosts and services disappeared or appeared;
  • Changes in services: change of software or versions.

Module 2. SSL Certificate Inventory

The module is responsible for: determining SSL certificates from services on the external perimeter, continuously monitoring the validity period and notifying the expiration date. You can manually download the SSL certificate.

Module 3. Threat Analysis

The module provides monitoring safety of the external perimeter in manual and automated modes.

CVM has built-in own developments Awillix and scanning rules, as well as well-known security scanners. Periodic scanning vulnerabilities and manual testing of the external perimeter provides information about existing vulnerabilities and configuration flaws, logical vulnerabilities and possible fraudulent operations.

The team of specialists manually verifies vulnerabilities, prioritizes risks and gives clear, understandable recommendations for eliminating them. And the analyst team will promptly report critical vulnerabilities in components and software. The module analyzes compromised credentials data and notifies about new cases.

Key tasks that CVM solves

  • Reduction of attack surface and criticality level
    • Reduces the surface of the attack and the lifetime of vulnerabilities. Reduces the ability of attackers to develop attacks and exploit critical vulnerabilities.

  • Increasing the complexity of a possible hack

    • Regular remediation of identified vulnerabilities increases the level of a potential attacker, making hacking impossible in most cases.

  • Feedback and recommendations of pentesters

    • As part of the subscription, the customer has the opportunity to directly communicate with a dedicated team of penetration testing specialists. Information security specialists of the company can ask any questions about the security of their infrastructure and receive individual recommendations.