Grouping assets by Device type, Operating systems, Applications installed and Business units.
Depending on the size of the organization or the age of the assets, the list of known vulnerabilities can be pages long.
In this step, the vulnerabilities will be ranked from the highest risk to the lowest depending on multiple factors. Our vulnerability management solution experts will prioritize these by the Common Vulnerabilities and Exposure (CVE) Score and by the unique risk they pose to your organization.
Vulnerabilities are assigned a severity level and are ranked as low, medium and high.