openPR Logo
Press release

Strobes Security Announces Strobes Vulnerability Intelligence, Enhancing Priority Scoring and Algorithm

05-11-2022 01:56 PM CET | IT, New Media & Software

Press release from: Strobes Security Inc

Strobes Security announced today the availability of Strobes Vulnerability Intelligence (VI), a threat intelligence tool. Strobes VI is the result of two years of research and development work with the goal of creating the best VI correlation tools that ingest vulnerability data from 30 different advisories, Indicator of Compromises (IOCs) and over 100 feeds including trend analysis from Twitter.

Strobes Security's flagship product, Strobes VM, provides customers with a better way to prioritize vulnerabilities. With the introduction of predictive prioritization, Strobes was able to quickly help customers find and patch the top critical vulnerabilities in their organization. For the prioritization to work accurately and provide the best results, maintaining and integrating with an advanced vulnerability intelligence tool (Strobes VI) was of the utmost importance.

Akhil Reni, Strobes Security CTO, explains the value of this data: "Data from Strobes VI helps us to quickly identify whether discovered vulnerabilities have a publicly available exploit, a zero day, if a vulnerability is converted into an exploit kit for ransomware, or malware attacks." Existing Strobes Security customers are already experiencing significant improvements in the way the platform manages priority scores.

For example, the Strobes Security team created a patch plan for a large healthcare company in Australia with 1,000 critical vulnerabilities inside a haystack of 500,000 vulnerabilities. These efforts resulted in reducing three months of manual effort.

Strobes VI also correlates with different taxonomies like Open Web Application Security Project® (OWASP), Common Attack Pattern Enumeration and Classification (CAPEC), Web Application Security Consortium (WASC), and compliance frameworks like the National Institute of Standards and Technology (NIST). Strobes Security's objective is to continuously maintain and upgrade the Strobes VI to support more IOC feeds, APT references, Taxonomies, and compliance frameworks.

For the next 4 months, Strobes VI will be available as a public API for anyone to connect with to stay up to date on Vulnerability Intelligence at no cost. Freemium options will be available at the official product launch. Access Strobes VI: (https://www.strobes.co/blog/introducing-strobes-vi)

Strobes Security Inc
5700 Tennyson Parkway, Suite 372,
Plano, Texas 75024
https://strobes.co

About Strobes Security
Strobes Security develops products and solutions for all organizations to solve challenges in the vulnerability management space using security automation and predictive prioritization. The current product offerings include Strobes VM365 and Strobes DevSecOps. Additional services are available including Strobes PTaaS (Pen Testing as a Service).

This release was published on openPR.

Permanent link to this press release:

Copy
Please set a link in the press area of your homepage to this press release on openPR. openPR disclaims liability for any content contained in this release.

You can edit or delete your press release Strobes Security Announces Strobes Vulnerability Intelligence, Enhancing Priority Scoring and Algorithm here

News-ID: 2621385 • Views:

More Releases from Strobes Security Inc

Strobes Security Announces Partnership with Global Digital Solutions and Professional Services Firm TechStar Group
Strobes Security Announces Partnership with Global Digital Solutions and Profess …
Strobes Security today announced the strategic partnership with TechStar Group, a global digital solutions and professional services firm that empowers companies to complete by leveraging emerging technologies. TechStar Group has helped Fortune 500 companies with their digital transformation. The Strobes Security and TechStar Group partnership is a perfect marriage enabling TechStar to deliver their offerings in a more secure manner using Strobes Security products: Strobes VM365, Strobes DevSecOps and Strobes Penetration
Strobes Security Inc. Announces Availability of Game-Changing Vulnerability Management Platform
Strobes Security Inc. Announces Availability of Game-Changing Vulnerability Mana …
Strobes Security Inc. announced today its availability of Strobes in the US market. Backed by angel investors including high net worth individual (HNI) Swastik Bihani, Head of Products & GM @ PayPal and SucSeed Ventures, a Venture Capital Angel fund, the Strobes team has developed game-changing machine learning based vulnerability management solutions for all sized organizations. Strobes, a SaaS based, risk centric vulnerability management platform, helps companies save time and

More Releases for Vulnerability

Vulnerability Assessment Solutions Market 2021 | Detailed Report
Vulnerability Assessment Solutions Market Forecasts report provided to identify significant trends, drivers, influence factors in global and regions, agreements, new product launches and acquisitions, Analysis, market drivers, opportunities and challenges, risks in the market, cost and forecasts to 2027. Get Free Sample PDF (including full TOC, Tables and Figures) of Vulnerability Assessment Solutions Market @ https://www.reportsnreports.com/contacts/requestsample.aspx?name=5016573 The report provides a comprehensive analysis of company profiles listed below: - Tenable - Rapid7 - Qualys - GFI
Perle Meltdown and Spectre Vulnerability Disclosure
Perle Systems, a global manufacturer of secure device networking hardware, has confirmed its, announces the products are not generally affected by CVE-2017-5753 and CVE-2017-5715, collectively known as Spectre, or CVE-2017-5754, known as Meltdown. The Meltdown vulnerability allows an attacker to bypass the hardware barriers between memory and applications running on the computer, which can allow an attacker to access data, passwords and crypto-keys. The Spectre vulnerability breaks the isolation between applications that
Perle Closes KRACK IEEE 802.11 Security Standard Vulnerability
NASHVILLE, November 22nd, 2017 — Perle Systems, a global manufacturer of secure device networking hardware, has released new firmware for the IOLAN SDS W Secure Wireless Device Server to patch the recently disclosed vulnerability found in WPA2. Serious weaknesses were recently discovered in the WPA2 protocol standard, which secures all modern protected WiFi networks. Using Key Reinstallation attaCKs (KRACK), it is possible for an attacker to harvest sensitive information being transmitted
Vulnerability Management Market Size Share - Industry Trends 2018
"The Latest Research Report Vulnerability Management Market - Size, Share, Trends And Forecast, 2012 - 2018 provides information on pricing, market analysis, shares, forecast, and company profiles for key industry participants. - MarketResearchReports.biz" Vulnerability is defined as the weaknesses in the software program that allows an unauthorized user to access the sensitive data or gain control over the data of authorized users. Vulnerability management is the practice of securing the confidential
Compliance Combines with Vulnerability Scanning to Create Aegify
SANTA CLARA, Calif., December 11, 2012 - Two security firms, the established Rapid7 vulnerability manager and eGestalt, a cloud-based compliance management provider, have signed an OEM deal that will do something for the IT security industry that hasn't been done before: a combination security and compliance posture management offering called Aegify SPM. The SPM stands for Security Posture Management, and eGestalt of Santa Clara defines SPM as "the art and science
ComGuard to Provide Security from Recent DHCP Vulnerability
ComGuard, a Dubai based leading value added distributor for IT security products and solutions in the Middle East and North Africa region today announced the availability of a patch from BlueCat Networks for its appliance-based DNS and DHCP software solutions that addresses the latest DHCP vulnerability publicised by the Internet Systems Consortium (ISC). BlueCat Networks discovered the vulnerability and was prepared to immediately provide patches to its customers on the