Updated basis entry

This commit is contained in:
Dulce Montemayor
2019-06-25 22:54:03 -07:00
committed by GitHub
parent ef0a5af8ab
commit 95c91ebcb5

View File

@ -25,24 +25,14 @@ The cybersecurity weaknesses identified in your organization are mapped to actio
Each security recommendation includes an actionable remediation recommendation which can be pushed into the IT task queue through a built-in integration with Microsoft Intune and SCCM. It is also dynamic in the sense that when the threat landscape changes, the recommendation also changes as it continuously collect information from your environment. Each security recommendation includes an actionable remediation recommendation which can be pushed into the IT task queue through a built-in integration with Microsoft Intune and SCCM. It is also dynamic in the sense that when the threat landscape changes, the recommendation also changes as it continuously collect information from your environment.
## The basis of your security recommendation ## The basis of the security recommendation
Each machine in the organization is scored based on three important factors: threat, likelihood to be breached, and value, to help customers to focus on the right things at the right time. Each machine in the organization is scored based on three important factors: threat, likelihood to be breached, and value, to help customers to focus on the right things at the right time.
Threat landscape Threat - Characteristics of the vulnerabilities and exploits in your devices and breach history. Based on these factors, the security recommendations shows the correponding links to active alerts, ongoing threat campaigns, and their corresponding threat analytic reports.
- Vulnerability characteristics (CVSS score, days vulnerable)
- Exploit characteristics (public exploit and difficulty, whether it is included in a bundle or exploit kit)
- Endpoint detection and response (EDR) security alerts (active alerts, breach history)
- Threat analytics (live campaigns, threat actors)
Breach likelihood Breach likelihood - Current security posture and resilience against threats
- Current security posture
- Internet facing
- Exploit attempts in the organization
Business value Business value - Your organization's assets, critical processes, and intellectual properties
- High value asset (HVA) analysis (Windows Information Protection, HVU, critical process)
- Run-time and dependency analysis
## Navigate through your security recommendations ## Navigate through your security recommendations