Vulnerability management
runZero imports vulnerability reports from leading endpoint management and vulnerability management platforms.
In addition to importing data, runZero natively reports vulnerability information in the following categories:
-
Applications that expose data without authentication
-
Actively exploited vulnerablities in the wild
-
End-of-Life hardware, firmware, and software
-
Shared and compromised encryption keys
-
Expired and insecure certificates
-
Devices from embargoed manufacturers
-
Internet exposure of management services
-
Internet exposure of internal assets
-
Internet exposure of operational technology
-
Insecure protocol configurations
-
Missing security controls
-
Network outliers
Updated