Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Current »

Security providers are able to manage and curate an active exploit database that compliments the already implemented Daily Exploit Detection Service . This watchlist allows providers to add CVE’s that are known to be actively exploited for a period of time allowing the end user to prioritise further any issues found within their digital estate.

Once there is intelligence received regarding a CVE that is actively being used and exploited in the wild, this CVE can be entered into the Prism Active Exploit Detection Service. In turn, Prism will then correlate this actively exploited CVE with your vulnerability data held in Prism, and alert you of the fact.

This provides our clients with further remediation and risk prioritisation capabilities.

Users are able to add the following information:

  • CVE Number - Required field

  • Name - of the vulnerability or issue

  • Description - Brief description of the issue

  • Origin - Where the issue intelligence originates from

  • Expiry - Ability to select the expiry of the watchlist item, default 28 days or a custom date in the future

  • No labels