On This Page
Welcome to Vulnerability Mitigation App
To view the TOS Aurora Knowledge Center for Vulnerability Mitigation App, click here.
Vulnerability Mitigation App (VMA) is a Marketplace vulnerability management data correlation application that leverages network insights using Tufin SecureTrack with vulnerability data derived from vulnerability scanners to effectively prioritize mitigation efforts through via SecureChange. With this app, organizations can improve how they conduct their vulnerability prioritization within a business-context, simplify their risk assessment and impact analysis via risky rule identification and correlation, and mitigate vulnerabilities via tickets submitted to SecureChange.
This app integrates between SecureTrack and SecureChange, and external vulnerability management solutions, which include: Tenable.io, Tenable.sc, Nessus Professional, QualysGuard, Qualys VMDR, Rapid7 Nexpose, and Rapid7 InsightVM. This integration enables you to effectively prioritize network-based vulnerabilities in assets and rules in your critical segments/zones and automate their mitigation.
These vulnerability correlation and policy management capabilities provide your organization with context for identifying business-specific network-based vulnerabilities and enable a mitigation approach that minimizes risks by leveraging existing SecureTrack and SecureChange capabilities. Vulnerability Mitigation App uses SecureTrack to identify assets in critical segments/zones that are currently vulnerable as a result of available access rules. These vulnerable assets and weak rules can then be automatically prioritized for mitigation and remediation (assets), or modification and removal (rules), using SecureChange - and these are just the basic capabilities!
VMA offers you the following benefits:
- Understand security trends across critical assets
- Understand exposed vulnerabilities across network zones
- Automate data aggregation from external vulnerability management solutions
- Gather business intelligence from sharable HTML reports
- Prioritize network zones for vulnerability management
- Manually synchronize with vulnerability management solutions outside of the defined schedule
- Prioritize assets for mitigation and remediation
- Prioritize rules for mitigation and removal
- Open asset decommission tickets in SecureChange
- Open group modification tickets in SecureChange
- Open rule modification tickets in SecureChange
- Track server decommission tickets in SecureChange