Security

Puppet launches its first vulnerability remediation product


Puppet has launched Puppet Remediate — its first vulnerability remediation product. The product aims to reduce the time from vulnerability detection to remediation by unifying infrastructure and vulnerability data, quickly identifying which infrastructure resources are being impacted and taking immediate action to remediate vulnerabilities.

Key features of Puppet Remediate include the following:

  • Shared vulnerability data between security and IT ops: The platform unifies infrastructure data with vulnerability data from Tenable, Qualys and Rapid7. This prioritizes vulnerabilities while enabling IT ops to access vulnerability data in real time to reduce delays.
  • Risk-based prioritization: Puppet Remediate includes a dashboard that lists the most critical vulnerabilities to show IT ops which assets have vulnerabilities and which should be fixed first.
  • Agentless remediation: The product includes four prebuilt tasks, including the ability to update packages. Additionally, it can load modules from Puppet Forge, where IT operators, security analysts and developers share ready-to-automate solutions as Bolt tasks. These capabilities enable IT ops to take action to remediate a vulnerability without leaving the application or having to use a command-line interface or write scripts and without requiring any agent technology.

Additionally, according to Puppet, its channel partners help provide an established infrastructure and information security practice.

Security continues to be an important area of improvement for organizations. As more devices are connected through IoT, more vulnerabilities are exposed to those with malicious intent. In July, SafeBreach launched its newest version of the GRID platform in an effort to help security teams prioritize and manage security gaps.

Risk-based prioritization has been identified as a cost-effective way to reach security goals, as it identifies the most critical and immediate risks to an organization and then treats them. This enables organizations to use their security budgets in an effective way while still providing critical security.


Dig Deeper on Network threat detection




Source link

Tags

About the author

GG

Add Comment

Click here to post a comment

Your email address will not be published. Required fields are marked *

Do NOT follow this link or you will be banned from the site!