Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Once there is intelligence received regarding a CVE that is actively being used and exploited in the wild, this CVE will enter can be entered into the Prism Active Exploit Detection Service. In turn, Prism will then correlate this actively exploited CVE with your vulnerability data held in Prism, and alert you of the fact.

This provides our clients with further remediation and risk prioritisation capabilities.

Users are able to add the following information:

  • CVE Number - Required field

  • Name - of the vulnerability or issue

  • Description - Brief description of the issue

  • Origin - Where the issue intelligence originates from

  • Expiry - Ability to select the expiry of the watchlist item, default 28 days or a custom date in the future

...