This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject

NetWitness Community

  • Home
  • Products
    • NetWitness Platform
      • Advisories
      • Documentation
        • Platform Documentation
        • Known Issues
        • Security Fixes
        • Hardware Documentation
        • Threat Content
        • Unified Data Model
        • Videos
      • Downloads
      • Integrations
      • Knowledge Base
    • NetWitness Cloud SIEM
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Detect AI
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Investigator
    • NetWitness Orchestrator
      • Advisories
      • Documentation
      • Knowledge Base
      • Legacy NetWitness Orchestrator
        • Advisories
        • Documentation
  • Community
    • Blog
    • Discussions
    • Events
    • Idea Exchange
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Community Support Forum
      • Community Support Articles
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Training
    • Blog
    • Certification Program
    • Course Catalog
      • Netwitness XDR
      • EC-Council Training
    • New Product Readiness
    • On-Demand Subscriptions
    • Student Resources
    • Upcoming Events
    • Role-Based Training
  • Technology Partners
  • Trust Center
Sign InRegister Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Technology Partners Documentation
  • NetWitness Community
  • Technology Partners
  • Technology Partners Documentation
  • Risk Based Security - Technology Integrations
No ratings

Risk Based Security - Technology Integrations

MWolff
Frequent Contributor MWolff Frequent Contributor
Frequent Contributor
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Report Inappropriate Content

‎2019-02-15 02:32 PM - edited ‎2021-07-07 06:19 PM

Risk_Based_Security.png                                                                                                                    RSA-Ready-Logo.png

 

Risk Based Security (RBS) provides detailed information and analysis on Vulnerability Intelligence, Data Breaches, and Vendor Risk Ratings. VulnDB is the most comprehensive and timely vulnerability intelligence available and provides actionable information about the latest in security vulnerabilities. VulnDB allows organizations to search on and be alerted to the latest vulnerabilities, both in end-user software and the third-party libraries or dependencies that developers use to build applications. A subscription to VulnDB provides organizations with simple to understand ratings and metrics on both vendors and products, and how each contributes to the organization’s risk-profile and cost of ownership.

 

When a new vulnerability is disclosed, organizations need to know if and where they are impacted without having to do a vulnerability scan of their environment. VulnDB contains over 65,000 additional vulnerabilities not found in the frequently relied-upon Common Vulnerabilities and Exposures (CVE) database and a much higher degree of information for each vulnerability, providing the richest, most complete vulnerability intelligence available. VulnDB helps customers better address points of risk across their organization – from application development and IT infrastructure management to security operations, vendor risk management, and procurement.

 

Instead of relying on legacy vulnerability scanning, the VulnDB integration with RSA Archer allows organizations to easily map vulnerability data to the assets and vendors in their environment and quickly identify if a newly disclosed vulnerability will impact them. Armed with this insight, organizations can efficiently prioritize and plan remediation activities, and also quickly identify relevant vulnerability data during security incident response activities.

 

Partner Product RSA Product Documentation & Downloads
Risk Based Security VulnDB RSA Archer

Risk Based Security page on RSA Exchange

Labels:
  • RSA Archer Suite
  • Technology Partners
  • Archer
  • governance_risk_compliance
  • GRC
  • risk based security
  • RSA Archer
  • RSA Archer Suite
  • rsa ready
  • Technology Partner
  • vulndb
Was this article helpful? Yes No
0 Likes
Version history
Last update:
‎2021-07-07 06:19 PM
Updated by:
Frequent Contributor MWolff Frequent Contributor
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Acceptable Use Policy
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.