Case: Fortune 100 Healthcare Firm : Vulnerability Risk
A major healthcare firm that delivered services to tens of millions of members, they wanted to take all measures possible to protect the private and confidential information of customers.
With Brinqa, they were able to ensure that vulnerability prioritisation and remediation efforts consistently worked towards achieving their security goals.
The organisation processed a large magnitude of private and confidential information. So they wanted to revamp an ageing vulnerability management program, with a primary goal to use Brinqa to assess and improve its ability to protect the security and integrity of confidential member data.
Learn more about Brinqa
Case: Fortune 500 Financial Services Firm : Vulnerability Risk
The financial services firm provided investment management services across the Americas, Europe and Asia. As a cutting edge financial services organisation they were involved in high-value business transactions. So, it was crucial for them to ensure that the technology infrastructure enabling critical business processes was secure and protected against compromise.
Using the Brinqa solution, the customer improved visibility into their technology infrastructure and addressed critical questions of cyber risk.
Learn more about Brinqa
Each time a new threat was detected, the JCE team would scramble to mitigate risk to servers and clients. Working in a reactive environment made it difficult to perform a proper risk reduction when they weren’t able to predict what was coming.
Vicarius’ Topia allowed JCE to understand threats and act fast to mitigate business risks with limited resources. Topia’s risk-analysis engine helped them identify high risk applications that they could patch and protect.
Case: Mandel Foundation
The Mandel Foundation needed a tool that could provide fast and proactive mitigation against cyber-threats.
Vicarius’ Topia completely changed how they tracked and mitigated CVE and patch based threats, using the Topia Patchless ProtectionTM tool and real time analysis.
Learn more about Vicarius.
A Nessus Manager and Tenable.io hybrid deployment was used for Nessus Agents in their enterprise environment. Tenable.io was required for user workstation Nessus Agent scan operations, and Nessus Manager was used for servers and other permanent on-premise infrastructure.
Initech leveraged their existing Tenable.sc infrastructure to achieve their vulnerability management programme goals by importing agent scan data from Nessus Manager and Tenable.io into Tenable.sc for unified reporting and analytics
Sprocket leveraged Tenable.io to manage all aspects of their environment. The solution used Nessus Agents for all Windows, Linux, and macOS devices for local scan and audit information, and Nessus scanners located in private cloud instances in each organizational theater for remote network scanning.
Case: Breached organisation uses Network Insight to pinpoint source of infection
Core Systems were contacted by a customer who had suffered a massive breach from an advanced persistent threat (APT), and they wanted to make sure it never happened again.
Core Security went to the site and installed Network Insight’s hardware, sensors that passively observe communications going to and from a network.
A few days later, the engineers met with the organization to go over the results. In less than two days, Network Insight detected four active threats that had not yet been uncovered by any of the other security solutions the organization used. They quickly decided to purchase and deploy Network Insight.
One of the world’s largest airline carriers, with more than 3,000 daily departures throughout the Americas, Europe and Asia and carried approximately 55 million passengers per year. In an effort to stay one step ahead of ever-evolving network threats, the company’s Information Security Director, determined that they needed to augment their current security mechanisms.
The carrier used the Core Security product, Core Impact, the first comprehensive penetration testing product for assessing specific information security threats to an organization. The product enabled them to replace the inconsistent, manual penetration testing tools they had previously used with a professional, state-of-the-art, automated penetration testing solution.
Book a 1:1 Consultation
Book a demonstration
A free, 30 minute interactive online session where we share our best practice tips on Enterprise vulnerability and threat management.