Intelligence-Driven Vulnerability Management
Resource-strapped IT departments need to prioritize vulnerabilities and threats that will have the most impact within their organization's environment. Many businesses rely on common vulnerability and severity metrics (CVE, CVSS, CWE, etc.) to prioritize vulnerabilities that need attention. Attackers, on the other hand, don't necessarily prioritize their exploits by severity scores; they are motivated by the information and tools that are readily available to them.
Your team could have several vulnerabilities scored as critical, but the possibility of exploitation may be low for your environment. Since most organizations have limited resources, time, and skillsets, it's not likely you have an analyst on staff to analyze threat scores and then research the risk of exploitability within your environment.
Providing Context with Threat Intelligence
At Digital Defense we created Frontline Threat Landscape™ in the Frontline.Cloud™ platform. Threat Landscape leverages threat intelligence to help you understand the truly exploitable vulnerabilities that exist in your environment.
Using our proprietary machine learning model, we combine data from the standard scoring systems with daily threat intelligence feeds and chatter from the dark web, hacker forums, and other intelligence sources to provide curated threat intel relevant to your environment. We feed the data into machine-learning models that rank the possibility of exploitation of assets and vulnerabilities in the context of your organization’s infrastructure.
Threat Landscape allows you to take the leap from awareness of the vulnerability risk in your infrastructure to establishing and tracking an effective remediation strategy so you work smarter rather than constantly working harder.
Exclusive to Threat Landscape are a host of different dashboards that provide insight into active vulnerability threat risk on your network. The Threat Summary dashboard includes an active threat feed of vulnerabilities on your network that have been exploited in the last 90 days along with ratios describing threat activity in the context of your network and overall activity in the wild.
Frontline Threat Rank™
Frontline Threat Rank is the first of two components that make up Frontline Threat Landscape.
Threat Rank does what it says. It ranks threats that are exploitable inside your network. Your team gets insight into the likelihood of whether an asset can be compromised. Threat Rank weighs popularity of the vulnerability in the wild, its exploitability, and whether a rootkit for that vulnerability is for sale on the dark web. If all of these conditions exist, the threat is ranked as high, and your team can make a prioritization call.
Threat Rank has several reports that provide clear, comprehensive results. Below is a short list:
- Threat Rank by Asset
- Trending Threat Rank Score
- Outstanding Vulnerability by Threat Rank
- Vulnerabilities You Should Fix
- Threat Rank Breakdown
Frontline Threat Rank is now live in Frontline.Cloud and accessed from Frontline Active View.
Frontline Active Risk Score™
The second component of Frontline Threat Landscape is Frontline Active Risk Score™ which helps you tune your organization's appetite for risk. We realize there are a myriad of ways to assess risk inside your organization, making it difficult to determine your business's risk threshold. Active Risk Score considers factors unique to your environment using prebuilt or configurable risk profiles combining vulnerability severity, Frontline Threat Rank, asset exposure, and asset criticality to create and rate your organization's risk appetite.
Preliminary reporting for Active Risk Score includes:
- Vulnerability Active Risk Trends
- Outstanding vs. Fixed by Active Risk
- Active Risks Summary
- Vulnerability Average Age by Active Risk
Watch for our announcement of Frontline Active Risk Score™ in the third quarter.
Threat Landscape operationalizes Vulnerability Threat Intelligence so you not only curate a remediation strategy that is most productive for your risk posture, but also track and assess the effectiveness of your strategy over time.
This provides better insight into how tuning your remediation plan affects your risk exposure.
Vulnerability Management Made Easy
Digital Defense is here to simplify and streamline your vulnerability management. Our team is dedicated to ensuring our Frontline VM customers get actionable results and empowering insight in a user-friendly solution. Frontline VM is delivered via our SaaS Frontline.Cloud™ platform that is lightweight and simple to deploy. It also supports our threat scanning (Frontline ATS™) and web application scanning (Frontline WAS™) systems. See how Frontline can optimize your team's efficiency and impact on overall security posture.