diff --git a/website/views/pages/vulnerability-management.ejs b/website/views/pages/vulnerability-management.ejs index 2c416cb622..269b44e15b 100644 --- a/website/views/pages/vulnerability-management.ejs +++ b/website/views/pages/vulnerability-management.ejs @@ -12,9 +12,9 @@
Not every CVE requires your attention. Focus on known exploits and vulnerabilities that actually exist in your environment first.
+Be intentional about what you patch. Focus on known exploits and vulnerabilities that actually exist in your environment first.
Up-to-date data without scans -Traditional network vulnerability scans can make endpoints run more slowly. Fleet does things differently.
+Traditional network vulnerability scans can clog networks. Fleet does things differently.
Consolidate your security stackConsolidate your point vulnerability solution with your cybersecurity asset management and log capture tool.
Not every CVE requires your attention. Focus on known exploits and vulnerabilities that actually exist in your environment first.
+Be intentional about what you patch. Focus on known exploits and vulnerabilities that actually exist in your environment first.
Track patch progress of “celebrity CVEs” across every operating system, every cloud, and every device
Help teams work on vulnerabilities that have actually been exploited (CISA KEVs) or have a high probability of being exploited (EPSS), or whatever is important in your environment
@@ -66,11 +66,11 @@Traditional network vulnerability scans can make endpoints run more slowly. Fleet does things differently.
+Traditional network vulnerability scans can clog networks. Fleet does things differently.
Demonstrate an accurate security posture
-Lightweight enough for the most brittle environments
-Easily get any data you need to report against patch deadlines
+Demonstrate an accurate security posture tailored to your environments
+Lightweight enough for the most brittle environments (OT, data centers, embedded/BTS, low-latency gaming servers)
+Triage a high-urgency zero day in hours, not days. Get data on any vulnerability in your environment on demand
Consolidate your point vulnerability solution with your cybersecurity asset management and log capture tool.
+Consolidate your point vulnerability solution with your cybersecurity asset management and log capture tools.
Reduce tool sprawl and wasted budget
-Prevent competing architecture and suddenly-incompatible data
-Process CVEs from cloud and non-cloud assets in a single platform
+Prevent duplicated, inaccurate CMDBs to reduce tool sprawl and wasted budget
+Normalize asset management data and software inventories from multiple tools and operating systems
+Process CVEs across cloud and non-cloud assets in a single platform and see who's responsible for what
+Collect consistent security event data, like file events, by using the same agent and queries to ship the logs
Automatically match CVEs to your operating systems, apps, extensions, browser plugins, Python libraries, everything.
Look up vulnerabilities, system state, and hardware details as fast as the cloud team can
-Use over 300 data tables to reduce blockers, prioritize better, and go to other teams less
+Instantly look up vulnerabilities, system state, and hardware details using real data from the actual device
+Prioritize more efficiently with a thin, admin-level agent that has visibility down to the chipset of any endpoint
+Access over 300 tables of system state data. Use presets or create your own queries
Like Fastly and Gusto, give your teams a consistent interface for better collaboration.
Give observer-level access to your IT support, infrastructure teams, or anyone who needs it
-Show progress towards patching goals and share live reports with auditors or internal IT and platform teams
+Show progress towards patch deadlines, down to the minute
+Share live data with internal IT and platform teams and export reports for auditors
Help IT and infrastructure teams identify the most time-sensitive patches to work on