Vultage Features

VultageUnifying Vulnerabilities

Vultage combines vulnerabilities from different sources. It is possible to extract the real risk situation of the organization based on the vulnerabilities by combining the different elements that create vulnerabilities.

Efficient Vulnerability Data Analysis

In general, statistical data such as risk tendency and closure status of vulnerabilities can be easily produced from the collected vulnerability data.

Consolidating Security Findings

There is no single automated vulnerability scanner that can reveal all security risks. Because of the various requirements, organizations are forced to use multiple scanners. Vultage enables the consolidation of the security findings produced by these various tools into a single repository.

Comprehensive Security Coverage

Among the security findings collected, besides the vulnerabilities found in conventional network components, the solution also includes application security findings on applications that are on production. In addition to this, compliance findings, security findings produced by static scans over code repositories can be transferred to the Vultage vulnerability pool.

Enhanced Vulnerability Prioritization

It has many advantages for reporting and analysis when such a variety of security findings are gathered in one location. Due to a lack of resources, it is not possible to immediately resolve thousands or even tens of thousands of findings. Vultage assists organizations in deciding which vulnerabilities should be prioritized for coverage by both the specially developed finding prioritization technology and integration with other third party risk prioritization techniques.

Passive Weakness Reporting with Vultage

In order to actively perform security scans, multiple connections to the target systems must be opened. They are not specifically carried out on business-critical assets due to the traffic and processing power this scanning method generates. After receiving specific information, Vultage passively reports the weaknesses of these assets.