From c326a496e5878fe9b16daae24efe959cc939d0d9 Mon Sep 17 00:00:00 2001 From: Mike Thomas <78363703+mike-j-thomas@users.noreply.github.com> Date: Fri, 15 Dec 2023 01:43:22 +0900 Subject: [PATCH] Website vulnerability management content patch (#15644) . --- .../views/pages/vulnerability-management.ejs | 34 ++++++++++--------- 1 file changed, 18 insertions(+), 16 deletions(-) diff --git a/website/views/pages/vulnerability-management.ejs b/website/views/pages/vulnerability-management.ejs index 2c416cb622..269b44e15b 100644 --- a/website/views/pages/vulnerability-management.ejs +++ b/website/views/pages/vulnerability-management.ejs @@ -12,9 +12,9 @@
Forget triaging every CVE -

Not every CVE requires your attention. Focus on known exploits and vulnerabilities that actually exist in your environment first.

+

Be intentional about what you patch. Focus on known exploits and vulnerabilities that actually exist in your environment first.

Up-to-date data without scans -

Traditional network vulnerability scans can make endpoints run more slowly. Fleet does things differently.

+

Traditional network vulnerability scans can clog networks. Fleet does things differently.

Consolidate your security stack

Consolidate your point vulnerability solution with your cybersecurity asset management and log capture tool.

@@ -54,7 +54,7 @@

Forget triaging every CVE

-

Not every CVE requires your attention. Focus on known exploits and vulnerabilities that actually exist in your environment first.

+

Be intentional about what you patch. Focus on known exploits and vulnerabilities that actually exist in your environment first.

Track patch progress of “celebrity CVEs” across every operating system, every cloud, and every device

Help teams work on vulnerabilities that have actually been exploited (CISA KEVs) or have a high probability of being exploited (EPSS), or whatever is important in your environment

@@ -66,11 +66,11 @@

Up-to-date data without scans

-

Traditional network vulnerability scans can make endpoints run more slowly. Fleet does things differently.

+

Traditional network vulnerability scans can clog networks. Fleet does things differently.

-

Demonstrate an accurate security posture

-

Lightweight enough for the most brittle environments

-

Easily get any data you need to report against patch deadlines

+

Demonstrate an accurate security posture tailored to your environments

+

Lightweight enough for the most brittle environments (OT, data centers, embedded/BTS, low-latency gaming servers)

+

Triage a high-urgency zero day in hours, not days. Get data on any vulnerability in your environment on demand

Explore real data
@@ -85,11 +85,12 @@

Consolidate your security stack

-

Consolidate your point vulnerability solution with your cybersecurity asset management and log capture tool.

+

Consolidate your point vulnerability solution with your cybersecurity asset management and log capture tools.

-

Reduce tool sprawl and wasted budget

-

Prevent competing architecture and suddenly-incompatible data

-

Process CVEs from cloud and non-cloud assets in a single platform

+

Prevent duplicated, inaccurate CMDBs to reduce tool sprawl and wasted budget

+

Normalize asset management data and software inventories from multiple tools and operating systems

+

Process CVEs across cloud and non-cloud assets in a single platform and see who's responsible for what

+

Collect consistent security event data, like file events, by using the same agent and queries to ship the logs

@@ -99,8 +100,9 @@

Deep context from the environment

Automatically match CVEs to your operating systems, apps, extensions, browser plugins, Python libraries, everything.

-

Look up vulnerabilities, system state, and hardware details as fast as the cloud team can

-

Use over 300 data tables to reduce blockers, prioritize better, and go to other teams less

+

Instantly look up vulnerabilities, system state, and hardware details using real data from the actual device

+

Prioritize more efficiently with a thin, admin-level agent that has visibility down to the chipset of any endpoint

+

Access over 300 tables of system state data. Use presets or create your own queries

Explore real data
@@ -118,8 +120,8 @@

A collaborative approach to vulnerability management

Like Fastly and Gusto, give your teams a consistent interface for better collaboration.

-

Give observer-level access to your IT support, infrastructure teams, or anyone who needs it

-

Show progress towards patching goals and share live reports with auditors or internal IT and platform teams

+

Show progress towards patch deadlines, down to the minute

+

Share live data with internal IT and platform teams and export reports for auditors

Help IT and infrastructure teams identify the most time-sensitive patches to work on

@@ -139,7 +141,7 @@
-

Open-source endpoint ops

+

Open-source vulnerability management

Lighter than air