VMware Carbon Black Unveils Cloud Endpoint Vulnerability Management Module

VMware Carbon Black has released a Vulnerability Management module for its Cloud Endpoint solution.

VMware has owned Carbon Black since 2019. The security software tends to compete against CrowdStrike, SentinelOne and other endpoint detection and response (EDR) software providers.

Vulnerability Management Module: How It Works

The new VMware module lets a security team monitor Windows and Linux endpoints for operating system and application vulnerabilities and prioritize remediation based on the risk of exploitation, VMware said. It also consolidates various security functions into a single cloud-native agent and console and helps a security team identify and mitigate high-priority vulnerabilities.

The module takes a “scanless approach” to vulnerability management and automatically updates its vulnerability data every 24 hours, VMware stated. It leverages the Cloud Endpoint sensor to collect OS and application data and combines it in the cloud with Kenna Security vulnerability insights and risk scores. In doing so, a security team can use the module to retrieve up-to-the-minute vulnerability information and analyze the current state of endpoint vulnerabilities across its organization.

Furthermore, the module provides a security team with a prioritized and up-to-date list of common vulnerabilities and exploits (CVEs), VMware noted. It also ensures that a security team can use risk scoring and prioritization to assess endpoint vulnerabilities.

VMware Upgrades Its Cloud Workload Solution

The Vulnerability Management module comes after VMware in April 2021 enhanced the capabilities for its Cloud Workload solution.

InfoSec and DevOps teams can use the updated Cloud Workload capabilities to incorporate security into the continuous integration and delivery (CI/CD) pipeline and analyze and control application risks, VMware indicated. They also can leverage these capabilities to secure containerized applications in Kubernetes environments.

Return Home

No Comments

Leave a Reply

Your email address will not be published. Required fields are marked *