Comprehensive software reviews to make better IT decisions
Puppet Rolls Out Remediate
Puppet has rolled out Remediate. This release aligns with the ongoing consolidation between IT Operations and IT Security.
On August 21, 2019, IT automation vendor Puppet announced the release of its new tool, Remediate, focused on security vulnerability remediation.
Puppet Remediate brings together data from existing security tools that identify vulnerabilities, including Tenable, Qualys, and Rapid7. In doing so, Remediate bridges the gap between IT Ops and Security – which all too often interact via manual handoffs.
Remediate also allows for prioritization of vulnerabilities and helps take action to remediate vulnerabilities in an automated fashion.
Still from a Puppet Remediate training video. Source: Puppet.
Puppet’s launch of Remediate aligns with the trend toward integrating IT Ops and Security Operations.
Info-Tech has noted this trend in the vendor space, which may see some consolidation take place in the coming years. We also see this trend reflected in leading-edge organizations and how they are transforming their processes to break down silos between development, operations, and security.
DevSecOps is often easier said than done, however. Finding a combination of tools and processes that work for your organization will remain as challenging as ever.
Want to Know More?
COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in the office to working from home has made it difficult for security measures to keep pace. Specifically, how are businesses meant to maintain the same secure networks when their employees are no longer working in the office? Outside of the security of the IT departments, IT and security have a tough time ensuring that patching and vulnerability management remain at the forefront of a business’s priorities.
Google has identified “unsafe” code in the Chromium web browser engine. This flaw introduces a potential vulnerability that effects Google Chrome, as well as all Chromium-based web browsers.
More than ever, cybersecurity solutions are core to any MSPs offering. No longer should technology service providers be farming this out to dedicated security providers. Trust and peace of mind are the core tenets of what they are selling and solutions like Acronis Cyber Protect Cloud can provide the platform upon which to deliver on those promises.
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.
We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.
Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company simply stated, “It’s out of scope.” – meaning it had no intention to rectify or address the issue.
Will New IoT Security Frameworks Push Compliance Obligations to the Forefront of Security Discussions?
The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for cyberattackers is created.
Qualys VMDR Is Now Live: Increasing Security Threats Requires Strong Vulnerability Management Software
Qualys VMDR has hit the live market. Originally unveiled in February 2020 at Qualys Security Conference, VMDR is now publicly available as of April 16, 2020. Partnering with both large and small MSSPs, VMDR is designed to be scalable to any business enterprise and to automate the entire management cycle on all endpoints.
VMware has issued the highest Common Vulnerability Scoring System 3 (CVSSv3) rating, 10.0, on a vulnerability (CVE-2020-3952) found on its VMware vCenter Server version 6.7 software. VMware now has a patch to address this vulnerability, and administrators are urged to install the patch as soon as possible.