Vulnerability management

runZero imports vulnerability reports from leading endpoint management and vulnerability management platforms.

In addition to importing data, runZero natively reports vulnerability information in the following categories:

  • Applications that expose data without authentication

  • Actively exploited vulnerablities in the wild

  • End-of-Life hardware, firmware, and software

  • Shared and compromised encryption keys

  • Expired and insecure certificates

  • Devices from embargoed manufacturers

  • Internet exposure of management services

  • Internet exposure of internal assets

  • Internet exposure of operational technology

  • Insecure protocol configurations

  • Missing security controls

  • Network outliers

Updated