Insights

Webinar Recap: An Evolutionary Leap in Vulnerability Management

by

IT endpoint management pros share a massive problem: too many potential vulnerabilities and too little time! Last week we held a webinar to demo Adaptiva Evolve VM™, a technology designed to help meet this challenge. In this blog, I’ll share some highlights and slides from that webinar.

As you may already know, the vast majority of attacks happen at the endpoint.

Most IT pros feel they should inspect every endpoint for basic security hygiene at least daily, if not hourly. When vulnerabilities are discovered, however, remediating them is highly time consuming.

The time between discovering a vulnerability and remediating it is known as the vulnerability gap. Though a 2018 tCell report showed this as 38 days on average, we are hearing from customers that the gap is sometimes smaller, more like seven to 14 days. That’s still unacceptable. Every day you leave systems exposed you put your company at risk.

In many organizations, security teams will scan for vulnerabilities and hand off known issues to IT operations to remediate. This stretches the remediation gap, instead of shrinking it. That’s why security and IT operations teams are increasingly collaborating on vulnerability management.

Adaptiva Evolve VM will run live checks against endpoints, identify vulnerabilities, and automatically remediate them. Then it will re-scan and report back that the vulnerabilities are closed.

Adaptiva’s peer-to-peer platform has been proven for years in the Fortune 500 and Global 1000. It minimizes the amount of traffic sent over the WAN and rapidly delivers to endpoints on a LAN—all without impacting end users.

Adaptiva’s legendary Predictive Bandwidth Harvesting technology will protect the WAN, safely and reliably ensuring delivery of the huge payloads such as large OS updates and software patches.

Evolve VM provides an interaction dashboard system, which is fully customizable.

Evolve VM can easily check all endpoints globally for Windows vulnerabilities defined in the National Vulnerability Database (NVD).

Background: Many organizations maintain repositories of software vulnerabilities in OVAL, a standard for representing vulnerabilities in XML. The US National Institute of Standards and Technology (NIST) maintains one such repository, the NVD. The NVD contains security checklist references, security-related software flaws, misconfigurations, product names, and impact metrics.

These capabilities, and many more, make Evolve VM the most automated way to drive continuous endpoint compliance at scale.

Want to See Evolve VM in Action?

To see a live-action demo by Senior Solution Architect Dave Kingma, watch the webinar now:

Webinar On-Demand: An Evolutionary Leap in Vulnerability Management

Bill Bernat
Director of Product and Content Marketing, Adaptiva