• Solutions
    • Solutions

    • Scan
    • Analyze
    • Score
    • Automate
    • What is on my network?
      Quickly, comprehensively and accurately assess endpoints and servers for operating system and application vulnerabilities.
    • Which assets are at risk, and what should I do about their vulnerabilities?
      Identify which assets are at risk and receive actionable intelligence to reduce workload and increase effectiveness.
    • How do I measure my overall risk and where should I focus remediation efforts?
      Benefit from a clear, easy-to-understand metric to determine your organization’s security posture.
    • How can I integrate Frontline vulnerability findings into my security workflow?
      Easily integrate discovered, analyzed, scored, and prioritized vulnerabilities into leading security workflow management platforms and SIEMs.
    • Test
    • Educate
    • Compliance
    • How do I assess where I’m exposed from an attacker’s perspective?
      Assess your “network attack surface” and your “personnel attack surface”.
    • How do I ensure all personnel are cognizant of risky “digital behavior”?
      Increase the security IQ of employees, contractors, and patrons to effectively defend against a security breach.
    • Am I meeting requisite compliance standards? Leverage the expertise of one of the world’s longest tenured PCI Approved Scanning Vendors (ASV) to achieve compliance AND an optimal level of security.
  • Cloud Subscriptions
    • Frontline Cloud Subscriptions

    • Frontline Advanced™
    • Frontline Pro™
    • Frontline PCI Pro™
    • Frontline Advanced is Digital Defense’s flagship vulnerability management offering. Powerful and effective, the service is delivered in a rich, affordable and easy to consume subscription.
    • Frontline Pro provides the same industry leading solution subscription as Frontline Advanced, but adds a Personal Security Analyst (PSA) to help lift the burden of vulnerability management.
    • Frontline Payment Card Industry-Professional (PCI-Pro) service guides businesses through the PCI Data Security Standards (DSS) requirements maze with security expertise and personalized recommendations to achieve compliance.

    • Frontline Pen Test™
    • Frontline WAS Advanced™
    • Frontline Pen Test offers a conveniently packaged sequence of periodic (and scheduled) pen tests into an annual subscription.
    • Frontline Web Application Scanning Advanced (WAS Advanced) as a subscription will provide the highest level of results through a system that is easily deployed and maintained.

  • Platform
    • Platform

    • Frontline RNA™
    • Frontline VM™
    • Frontline WAS™
    • Frontline Reconnaissance Network Appliance (RNA) is a preconfigured network based device used to perform network security assessments without requiring onsite staff.
    • Frontline Vulnerability Manager (VM) is the industry’s most comprehensive, accurate, and easy to use VM platform – bar none.
    • Frontline Web Application Scanning (WAS) has been developed to provide the highest level of dynamic web application testing results through a system that is easily deployed and maintained.

  • Network Security Technologies
    • Technologies

    • DDI NIRV™
    • DDI VRT™
    • DDI DNA™
    • DDI NIRV – the technology core of Frontline RNA™ – works on the principle of real-time event-based tuning. As it learns more about hosts and the network, NIRV adjusts its plugin sets and auditing mechanisms in real time – leading to far more accurate and complete scanning data.

    • While Digital Defense has achieved public acclaim for its superior vulnerability scanning, vulnerability management, and best practice consultative services, we are also actively involved in security threat research.
    • Digital Node Attribution (DNA) is the core technology within Frontline VM that eliminates network drift. As point in time scans from RNA are fed into Frontline Vulnerability Manager™,
  • Professional Services
    • Professional Services

    • Frontline Pen Test Project™
    • Frontline Social Test™
    • Frontline Cyber Threat Management™
    • Understanding and addressing network and host vulnerabilities is, of course, an essential element to strong information security.
    • Social engineering is a popular technique attackers use to gain access to your network and, ultimately, valuable information held by your organization.
    • Frontline Cyber Threat Management solutions offer organizations expert threat intelligence to evaluate their level of risk in the ‘open, deep and dark web’.

    • SecurED™ Training
    • TEAM™
    • Consultative Services
    • SecurED, an entertaining awareness training designed to optimize employee retention of serious security intelligence and best practices.
    • TEAM is a comprehensive online learning management system that helps you address Security Training, Education, and Awareness Module (TEAM™) to reduce risk.

    • As your organization grows in size and complexity, determining exposure to information asset risks becomes more challenging, as does your ability to identify threats and implement effective plans to address them.

  • Get a Quote

Leading VMaaS Provider Solves False Positives Dilemma Plaguing IT

San Antonio, TX – January 19, 2017Digital Defense, Inc., a leading provider of Vulnerability Management as a Service (VMaaS™), today announced that Frost & Sullivan identified Digital Defense’s patented scanning technology as the best in the industry, according to its recent Vulnerability Management (VM) Global Market Analysis.

“The enterprise network undergoes significant changes over time including OS updates, internal server array configurations, and regroupings of user asset groups,” said Chris Kissel, senior industry analyst, information & network security at Frost & Sullivan. “If a vulnerability management vendor does not account for fluid changes in the network, two bad results can occur. The first is false positives where an anomaly pops up because the host and the device do not align in a network mapping; chasing down false positives is tiresome. The second result is more scary where devices get dropped from the scan and could become vulnerable and exploited without the knowledge of the network security team.”

“Digital Defense, Inc. takes an entirely different focus to VA scanning. DDI focuses the scan on active (live) hosts and utilizes its ability to dynamically track changes to these hosts over time, even as its characteristics change. Pragmatically, if you can control the host environment, you reduce the possibility of errors on the endpoints.”

“IT Security recognizes the importance of performing regular vulnerability assessments on systems and networks, but has overloaded the persons responsible for maintaining IT assets with false positives they are forced to research,” said Larry Hurtado, CEO of Digital Defense. “This leaves IT asset owners chasing their tails as they spend inordinate amounts of time investigating when they could be knocking off other things on their to-do lists. Many of our new clients are IT executives frustrated by seeing staff members continually burdened with investigating false positives from their previous vulnerability scans.”

The enterprise network undergoes significant changes over time including OS updates, internal server array configurations, and regroupings of user asset groups. On an operations level, the changing server environment is problematic; for network security appliances and systems on dynamic ranges, the possibility of drift is acute.

In a recent study, Digital Defense analyzed the behavior of 40,000 servers and 60,000 client devices. From this analysis, the one year drift showed that there could be as many as 15% server duplicates: another 15% of servers had stale VM data, and client machines could be mismatched as much as 83% of the time.

Conventional scanner technologies and analytics engines have trouble handling this drift as failed host matching can lead to both duplicates of existing vulnerabilities and masking of critical flaws as hosts change their characteristics over time.

The Digital Defense scan engine works on the principle of real-time event-based tuning. Digital Defense’s VA scanner, Network Intelligence Reconnaissance Vehicle (NIRV), is event driven and can adjust its plugin sets and auditing mechanisms in real time as it learns more information about the host and network. Information is gleaned from each host, service, and application, and is reused throughout the scope of the assessment, allowing for a more thorough audit of its peers.

For the report – https://www.digitaldefense.com/frost-sullivan-vm-report

About Digital Defense
Founded in 1999, Digital Defense, Inc. is a trusted provider of managed security risk assessment tools and solutions, protecting billions of dollars in assets for clients around the globe. This includes highly regulated industries such as healthcare, financial, and retail, as well as those entrusted with sensitive data such as law firms and energy companies. Digital Defense’s unique Vulnerability Management as a Service (VMaaS) model delivers consistently accurate vulnerability scanning and penetration testing, while its security awareness training promotes employees’ security-minded behavior. Digital Defense security solutions are highly regarded by industry experts, as illustrated by the company’s  top 25 ranking (#21) in Cybersecurity Ventures’ list of the World’s 500 Hottest Cybersecurity Companies, as well as inclusion in CSO Outlook’s Top 10 Network Security Companies, and CIO Review’s 20 Most Promising Cyber Security Solutions

Contact Digital Defense at 888-273-1412; visit www.digitaldefense.com, our blog, LinkedIn, or follow @Digital_Defense on Twitter.

# # #

Michael Becce, MRB Public Relations
mbecce@mrb-pr.com, 732-758-1100