diff --git a/website/views/pages/vulnerability-management.ejs b/website/views/pages/vulnerability-management.ejs index 04aadf0c57..50b542445f 100644 --- a/website/views/pages/vulnerability-management.ejs +++ b/website/views/pages/vulnerability-management.ejs @@ -11,12 +11,12 @@ A pocket monster orb being scanned for vulnerabilities
- Forget triaging every CVE -

Be intentional about what you patch. Focus on known exploits and vulnerabilities that actually exist in your environment first.

+ Mitigate CVEs automatically +

Build automations that close tickets or mitigate vulnerabilities by updating or removing software and running custom scripts.

Up-to-date data without scans

Traditional network vulnerability scans can clog networks. Fleet does things differently.

- Consolidate your security stack -

Consolidate your point vulnerability solution with your cybersecurity asset management and log capture tool.

+ Report what matters +

Let's face it, most built-in graphs leave you wanting more. Report MTTR and any other custom metrics exactly the way you want to using fresh data from real computers.

Show me See real data @@ -50,15 +50,16 @@
- Forget triaging every CVE + Mitigate CVEs automatically
-

Forget triaging every CVE

-

Be intentional about what you patch. Focus on known exploits and vulnerabilities that actually exist in your environment first.

+

Mitigate CVEs automatically

+

Build automations that close tickets or mitigate vulnerabilities by updating or removing software and running custom scripts.

-

Track patch progress of “celebrity CVEs” across every operating system, every cloud, and every device

-

Help teams work on vulnerabilities that have actually been exploited (CISA KEVs) or have a high probability of being exploited (EPSS), or whatever is important in your environment

-

Create webhooks that take action when researchers publish new CVEs that affect your environment, or when users find ways to change things

+

Automatically detect when old vulnerabilities are reintroduced, or mitigations falter.

+

Track and mitigate zero days, with live queries and policies, even before they're officially published as CVEs.

+

Only create tickets for vulnerabilities that affect your environment. Automate ticketing with Jira, ServiceNow, or integrate your own system.

+

Deep-link live data with internal IT and platform teams.

@@ -68,9 +69,8 @@

Up-to-date data without scans

Traditional network vulnerability scans can clog networks. Fleet does things differently.

-

Demonstrate an accurate security posture tailored to your environments

-

Lightweight enough for the most brittle environments (OT, data centers, embedded/BTS, low-latency gaming servers)

-

Triage a high-urgency zero day in hours, not days. Get data on any vulnerability in your environment on demand

+

Lightweight enough for the most brittle environments (OT, data centers, embedded/BTS, low-latency gaming servers).

+

Quickly pull data about important CVEs and zero days during an incident or audit.

See real data
@@ -91,6 +91,7 @@

Normalize asset management data and software inventories from multiple tools and operating systems

Process CVEs across cloud and non-cloud assets in a single platform and see who's responsible for what

Collect consistent security event data, like file events, by using the same agent and queries to ship the logs

+

Help teams work on vulnerabilities that have actually been exploited (CISA KEVs) or have a high probability of being exploited (EPSS), or whatever is important in your environment.

@@ -98,11 +99,11 @@

Deep context from the environment

-

Automatically match CVEs to your operating systems, apps, extensions, browser plugins, Python libraries, everything.

+

Fleet gives you data down to the chip level on every endpoint to help you make sense of which vulnerabilities to prioritize.

-

Instantly look up vulnerabilities, system state, and hardware details using real data from the actual device

-

Prioritize more efficiently with a thin, admin-level agent that has visibility down to the chipset of any endpoint

-

Access over 300 tables of system state data. Use presets or create your own queries

+

Automate prioritization with an admin-level agent that has visibility down to the chipset of any endpoint

+

Access over 300 tables of system state data. Use presets or create your own queries.

+

Automatically match CVEs to your operating systems, apps, extensions, browser plugins, Python libraries, everything.

See real data
@@ -114,15 +115,14 @@
- A collaborative approach to vulnerability management + Report what matters
-

A collaborative approach to vulnerability management

-

Like Fastly and Gusto, give your teams a consistent interface for better collaboration.

+

Report what matters

+

Let's face it, most built-in graphs leave you wanting more. Report MTTR and any other custom metrics exactly the way you want to using fresh data from real computers.

-

Show progress towards patch deadlines, down to the minute

-

Share live data with internal IT and platform teams and export reports for auditors

-

Help IT and infrastructure teams identify the most time-sensitive patches to work on

+

Track any “celebrity” CVE across every OS, every cloud, and every device, and show how quickly it was mitigated.

+

Avoid distracting your CISO with bloated reports. Only communicate facts important to your organization's KPIs. Show real-time mitigation progress (%) or sync with your favorite data tool like Microsoft BI.