Ivanti and Securin Team up For Cyber Threat Protection By CIOTechOutlook Team

Ivanti and Securin Team up For Cyber Threat Protection

CIOTechOutlook Team | Thursday, 09 November 2023, 05:25 IST

  •  No Image
Ivanti, the technology business that elevates and protects Everywhere Work, has announced a collaboration with Securin Inc., a prominent supplier of tech-enabled cybersecurity solutions and recipient of the SINET16 Innovators award. Ivanti Neurons for Vulnerability Knowledge Base, powered by Securin's Vulnerability Intelligence (VI), delivers authoritative, near-real-time vulnerability threat intelligence, allowing security specialists to accelerate vulnerability evaluations and prioritization.
 
By leveraging Securin VI’s comprehensive data set, the intelligence in Ivanti Neurons for Vulnerability Knowledge Base is enriched through input from numerous trusted sources, including MITRE, the National Vulnerability Database (NVD), CVE Numbering Authorities (CNAs), vendor advisories, and many more. Additionally, with the assistance of Securin’s API, Ivanti Neurons for Vulnerability Knowledge Base is better primed to seamlessly integrate with and enrich the capabilities of other Ivanti Neurons products including IT Service Management (ITSM), Risk-Based Vulnerability Management (RBVM), App Security Orchestration & Correlation (ASOC), Patch Management, Zero Trust Access (ZTA), Discovery, and Unified Endpoint Management (UEM), as per business wire. 
 
“Ivanti has long been a valued partner and we are thrilled to expand our partnership by providing Ivanti customers with more visibility into their potential cyber threats and exposures,” said Kiran Chinnagangannagari, Co-Founder and Chief Product & Technology Officer at Securin. “With this newfound visibility from various sources, customers can proactively plan mitigation and remediation strategies which is invaluable as cyber threats continue to multiply.”
 
Customers will benefit from this collaboration by improving their understanding of threat context and findings, effectively correlating exploitable vulnerabilities to patches, enabling quarantine and remediation for unpatched devices running risky applications, and providing IT administrators with a comprehensive view of enterprise assets and risks.  

CIO Viewpoint

From VPNs to Zero Trust: The Transition to a...

By Shankar Venkatesan, Senior IT Leader, Avalon Technologies

The Cyber Security Spar in Integrating IT and...

By Vimal Goel, CIO, HPCL-Mittal Energy

Towards Cyber Resilience: A Data-Centric...

By Puneet Gupta, Vice President & Managing Director, NetApp India/SAARC

CXO Insights

Emerging Trends, Challenges & Future Prospects...

By Sujoy Brahmachari, CIO & CISO, Rosmerta Technologies

Exploring Data-First Security and Automation in...

By Maheswaran S, Country Manager - S.Asia, Varonis Systems

Securing IT-OT Converged Infrastructure

By Saurabh Sharma, SMIEEE, FIE, CEH, Chief Manager (BIS) & CISO, Petronet LNG Ltd.

Facebook