Archives

VulnCheck and Cyware Partner to Bolster Vulnerability Management

VulnCheck

VulnCheck, the exploit intelligence company, announced a partnership with Cyware, the leader in threat intelligence management, security collaboration, and orchestrated response. VulnCheck will integrate its exploit intelligence solutions with Cyware’s Threat Intelligence Exchange (CTIX) to help enterprise customers rapidly identify and prioritize vulnerabilities, reduce response times, gain threat context and minimize risk exposure. Cyware will also ship with VulnCheck KEV, its recently launched catalog of known exploited vulnerabilities, featuring 80% more CVEs than the CISA KEV.

“It’s more important than ever to provide security teams with the tools to proactively respond to and better manage vulnerabilities at scale,” said Anuj Goel, CEO and co-founder, Cyware. “Our partnership with VulnCheck empowers defenders to tackle the vulnerability prioritization challenge and outpace threat actors before exploits can be weaponized.”

In addition to its EVI and IAI solutions, VulnCheck will also integrate its Known Exploited Vulnerabilities (KEV) catalog with Cyware’s CTIX. Together, VulnCheck and Cyware bring an unprecedented level of intelligence-powered defense to automate vulnerability management and correlate against threat feeds, enabling enterprise security teams to prevent and respond to the exploits that matter most.

Also Read: Atera and Cynet Announce Cybersecurity Alliance to Maximize MSP Margins 

“Cyware is an incredible partner, and excels at turning threat intelligence into action,” said Anthony Bettini, founder and CEO, VulnCheck. “Combining their excellence with our unique exploit intelligence capabilities creates a next-generation intelligence solution for defenders.”

Moving forward, VulnCheck and Cyware will provide additional joint offerings to customers, including VulnCheck-generated reports from its KEV database for inclusion in Cyware’s Situational Awareness Platform. The additional capabilities will unlock new efficiencies and seamless workflows to optimize threat intelligence.

SOURCE: Businesswire