Threat and Vulnerability Management App

The MetricStream Threat and Vulnerability Management App enables effective management of IT security by proactively aggregating and correlating threats and vulnerabilities across information assets. The app integrates with multiple end-point IT security and infrastructure management tools and security intelligence feeds to identify and prioritize the risk exposure for IT assets and streamline the remediation process.

The MetricStream Threat and Vulnerability Management App provides a systematic approach to identifying, prioritizing, and remediating information security threats and vulnerabilities on business critical information technology assets and applications.

Download Datasheet

Enabling High Performers

Responsive and personalized interface designed for threat and vulnerability management

Highly configurable to meet your specific threat and vulnerability requirements

Threat intelligence and insights for better decisions

Fast, lean, ready for the future

Features

Centralized Asset Repository

Consolidate IT assets into a common library leveraging out-of-box connectors with CMDB such as BMC Atrium and ServiceNow. Map IT assets to business entities, threats, and vulnerabilities. Manage and view these relationships in the form of data explorer and data browser.

Vulnerability Consolidation and Prioritization

Import vulnerability data from multiple third-party vulnerability scanning tools such as QualysGuard and Nessus. Generate a combined risk rating across the asset’s vulnerability and business context. Prioritize the vulnerability remediation strategies based on the risk rating. Orchestrate the remediation process workflow using predefined templates and rules.

Subscription to Threat Feeds

Monitor the threat landscape, zero-day advisories, and threat bulletins. Subscribe to RSS or e-mail based threat alerts from leading industry source, and filter threat alerts based on the key words.

Issue Management and Remediation

Identity and document the issues arising from threat and vulnerability management. Define the vulnerability remediation rules to auto-detect vulnerability patterns on assets and to auto-trigger remediation issues/incidents. Auto-trigger incidents from threat and vulnerability app into BMC Remedy and ServiceNow.
 

Prioritize and assign resources for investigation and remediation with an underlying workflow and collaboration engine. Define an action plan, and track the remediation process and issues to closure.

Threat and Vulnerability Monitoring

Generate real-time intelligence on threats and vulnerabilities through graphical dashboards and reports with drill-down capabilities. Gain a 360º view and continuously monitor your organization’s threat and vulnerability posture.

Learn More

Key Benefits

  • Import vulnerability scan data using a built-in integration engine
  • Correlate vulnerability scan data with IT asset business context to get a consolidated risk score
  • Receive notifications or “early warnings” to gain timely visibility to threats and vulnerabilities
  • Define configurable scoring methodologies to prioritize vulnerabilities
  • Gain actionable intelligence by transforming raw threat and vulnerability data
  • Intelligence Streamline and accelerate threat and vulnerability remediation
Contact Chat Request a demo Download RFP Template