Digital Defense Introduces Frontline Threat Landscape

Digital Defense, Inc. today announced the release of Frontline Threat Landscape, a unique feature within the company’s vulnerability management technology that incorporates threat intelligence to prioritize critical vulnerabilities that can be exploited. Accessible within Frontline.Cloud, the company’s proprietary software as a service (SaaS) security assessment platform, the feature leverages machine-based learning to provide threat intelligence data that delivers a more granular determination of risk for vulnerabilities identified in an organization’s network.

According to Gartner’s Market Guide for Vulnerability Assessment, “Not all vulnerabilities are created equally. Exploitability, prevalence in malware and exploit kits, asset context, and active exploitation by threat actors are critical qualifiers in assessing cyber risk.” The report further describes the incorporation of threat intelligence into vulnerability management technologies. “Methods are applied that analyze and prioritize vulnerabilities by using threat intelligence, organizational asset context, and risk modeling approaches such as attack path analysis. This is also an area in which advanced analytics methods are also being used, such as ML [machine learning]. This permits more granular and intelligent remediation strategies than the more simplistic severity approaches, especially at scale and when remediating with constrained resources.”*

Frontline Threat Landscape empowers organizations to prioritize remediation and optimize resources by combining:

  • Real-world vulnerability exploitation metrics
  • Industry-standard severity scores  
  • Digital Defense Vulnerability Research Team analyst insight 

*Gartner, Market Guide for Vulnerability Assessment, Craig Lawson et al, 20 November 2019 (Gartner subscription required).

Learn more about Frontline Threat Landscape here.

Leave a Reply

Discover more from The IT Nerd

Subscribe now to keep reading and get access to the full archive.

Continue reading