Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 3 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Enhanced Threat Intelligence Technology Announced by Outpost24

Outscan NX enables organisations to identify and prioritise the biggest security risks with predictive threat intelligence

by Guru Writer
April 13, 2023
in News
Blue Logo OUTPOST24
Share on FacebookShare on Twitter

Today, Outpost24 announced the release of a new Vulnerability Risk Management solution, Outscan NX. The utilisation of threat intelligence-led vulnerability prioritisation technology (VPT), along with automated network and cloud security assessment, provides a risk-based approach to vulnerability management that cuts cost, saves time and efficiently focuses on reducing the biggest risks for organisations. The technology aims to reduce vulnerability exposure time.

Outscan NX is an advanced vulnerability risk management solution that offers businesses a next-generation approach to securing their networks and cloud environments. Powered by evidence-based threat intelligence, this innovative tool uses attacker behavioural data and advanced machine learning models to analyse and predict the likelihood of a vulnerability being weaponized and exploited over time. By providing easy-to-understand and solution-based risk ratings, Outscan NX enables organizations to prioritize cloud and network vulnerabilities beyond the Common Vulnerability Scoring System (CVSS) by addressing real threats before they can be exploited by attackers.

According to the Ponemon Institute study, a staggering 60% of breaches occur as a result of known vulnerabilities that have gone unpatched. Additionally, more than half of respondents (52%) are unable to respond to vulnerabilities due to manual processes. These findings underscore the crucial need for organisations to adopt a risk-based approach to vulnerability remediation. By proactively identifying real risks and deploying automated measures to mitigate them, organisations can effectively prevent exploitation in the wild. Such an approach is paramount to increasing security efficiency and improving cyber resilience against evolving threats.

Outpost24’s Outscan NX is a fully integrated solution and provides a consolidated view of the biggest risks that an organization face in their networks, endpoints, and cloud environments:

  • Threat intelligence based risk rating for security teams to identify and prioritize vulnerabilities that pose the greatest risk, saving valuable time and resources
  • Agent based scanning to monitor hybrid and remote workers’ endpoints to minimize risk of disconnected assets for greater security controls
  • Scanning less scanning provides a snapshot of your network and alerts you of potential new risks as they appear in between scans
  • Solution-based reporting empowers security leaders with actionable insights to enhance their decision-making on risk mitigation and remediation strategies.
  • Hybrid and multiple cloud security scanning ensures consistent checks for misconfigurations across all major Cloud Service Providers (CSPs), including AWS, Azure, and GCP in a single console

Recently, Outpost24 revealed new threat intelligence research that examines traffers and the business of stolen credentials.

FacebookTweetLinkedIn
ShareTweet
Previous Post

Verimatrix’s Triple-Threat Initiative Enhances Mobile App Security

Next Post

From Data Breaches and Spyware, to New Cybersecurity Guidelines…

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information