fbpx

Announcing Risk-Based Endpoint Protection with Cisco Protected Kenna and Endpoint Safety

With a tidal wave of vulnerabilities out and brand-new vulnerabilities developing daily there, security teams have a whole lot to handle. Addressing each and every vulnerability is nearly difficult and prioritizing them is not any easy job either since it’s challenging to effectively concentrate on the small amount of vulnerabilities that issue most to your company. Moreover, the change to hybrid work helps it be tougher to assess and prioritize your vulnerabilities across your endpoints with conventional vulnerability scanners.

      Kenna Safety           maps out the vulnerabilities in your atmosphere and prioritizes the purchase in which you need to address them predicated on a risk rating. We’re thrilled to announce that after           Cisco obtained Kenna Security           this past year, we have recently released an integration between Kenna and           Cisco Secure Endpoint           to include valuable vulnerability context in to the endpoint.

With this particular initial integration, Secure Endpoint customers is capable of doing risk-based endpoint security. It enables clients to prioritize endpoint security and enhances risk investigation to accelerate incident reaction with three major use cases:

    1. Scannerless vulnerability presence: In a hybrid work place, it’s increasingly problematic for conventional vulnerability scanners to take into account all devices used. Instead of counting on IP deal with scanning to recognize vulnerabilities within an environment, now you can use the existing Safe Endpoint agent to obtain a complete image of the vulnerabilities you should triage.
    1. Risk-structured vulnerability context: During incident response, customers will have yet another data point by means of a Kenna danger score. For example, in case a compromised endpoint includes a risk rating of 95+, there exists a higher likelihood that the strike vector pertains to a vulnerability that Kenna provides identified. This may dramatically increase incident response by assisting the responder concentrate on the proper data.
    1. Accurate, actionable risk ratings: Organizations often battle to prioritize the proper vulnerabilities since most danger scores such as for example Common Vulnerability Scoring Program (CVSS) are usually static and absence important context. On the other hand, the Kenna Risk Rating is dynamic with wealthy context because it uses advanced information science strategies such as for example predictive modeling and device understanding how to consider real-planet threats. This permits you to realize the actual degree of danger in your atmosphere and allows you successfully prioritize and remediate the most crucial vulnerabilities first.

So how exactly does the Kenna integration function?

The Kenna integration brings Kenna Risk Scores into your Secure Endpoint console straight. As an illustration of the integration, the personal computer in the screenshot below (Shape 1) has been designated a Kenna Risk Rating of 100.

Kenna Risk Score in the Secure Endpoint console

Figure 1: Kenna Risk Rating in the Protected Endpoint console

Risk scores could be from 0 (lowest danger) to 100 (highest danger). The rating is inferred in line with the reported OS edition, build, and revision upgrade information, coupled with threat cleverness on vulnerabilities from Kenna.

Clicking on the specific numeric score itself provides you to a web page with a detailed report on all vulnerabilities present upon the endpoint (see Number 2 below).

List of all vulnerabilities on an endpoint
     Figure 2: Set of all vulnerabilities on an endpoint     

A danger is had by each vulnerability score, an identifier, and a explanation which includes icons with additional information predicated on vulnerability intelligence from Kenna:

                Active Web Breach:           This vulnerability has been exploited across energetic breaches on the web

                Quickly Exploitable:           This vulnerability is simple to exploit with proof-of-concept code being possibly available

                Malware Exploitable:           There's identified malware exploiting this vulnerability

All of this details is valuable context during an incident investigation extremely. Exploiting vulnerabilities is among the most typical ways malicious actors perform attacks, so by knowing which vulnerabilities can be found in the surroundings quickly, incident responders possess a much easier period honing in on what an attacker experienced their organization.

Additionally, for vulnerabilities which have fixes available currently, simply clicking the green “Fix Available” button on each and every vulnerability displays a box with links to the applicable patches, knowledge base articles, along with other relevant information (see Figure 3 below). Thus giving analysts the information they have to act on an endpoint efficiently.

Recommended fixes for each vulnerability

Body 3: Suggested fixes for every vulnerability

Who is able to accessibility the Kenna integration?

Vulnerability information and Danger Scores from Kenna Protection are now obtainable in the Cisco Secure Endpoint gaming console for:

 
    • Windows 10 computers running Safe Endpoint Windows Connector edition 7.5.3 and newer

Most vulnerabilities inside our customer bottom occur on Windows 10 workstations, so we made a decision to release very first with Windows 10 to provide this integration quicker. We anticipate adding support for additional Windows versions and os’s such as for example Windows 11, Home windows Server 2016, 2019, and 2022 soon.

We hope that integration is available by you useful! This is the to begin many steps that people are taking to include vulnerability info from Kenna Safety into Protected Endpoint, and we have been excited to see how many other use cases we are able to enable for the customers.

The Cisco Secure Selection Enterprise Agreement is a good solution to adopt and go through the complete Secure Endpoint and Kenna technology stack.  It offers instant cost benefits, the freedom to cultivate, and you pay just for the thing you need. Find out more at cisco.com/move/securechoice.

 

We’d want to hear everything you think. Ask a relevant question, Comment Below, and Remain Linked to Cisco Secure on sociable!

Cisco Secure Social Stations

Instagram
Facebook
Twitter
LinkedIn