on 2020-01-2204:11 PM - edited on 2022-10-1204:12 PM by ChristineTran
ThreatWatch is a pro-active cyber security solution that uses an AI powered vulnerability curation and no scan approach for impact assessment of assets including source code, containers, cloud instances, and servers.
The ThreatWatch integration takes vulnerability intelligence and impacts from ThreatWatch and feeds them into the Archer IT Security Vulnerabilities Program (ITSVP) use case in Archer, enabling organizations to access near real-time vulnerability intelligence along with continuous impact assessment of organizational assets. ThreatWatch shares product, patch and remediation information and pro-actively shares vulnerability impact information without the need for any scans on assets. ThreatWatch automatically classifies impact to provide actionable insights to SecOps teams like DoNow or DoLater and impact information is completely actionable with patch and remediation details to cover the last mile.
ThreatWatch integration with Archer enables organizations to:
Access near real-time vulnerability intelligence with automatic risk prioritization made available in Archer
Obtain pro-active no scan-based impact assessment for different kinds of assets in Archer
Easily generate reports and findings from the latest vulnerability intelligence
Provide management with the information they need, including which vulnerability impacts are critical and need to be addressed based on priority
The ThreatWatch Integration is an offering provided through the Archer Exchangetoenhanceyour existing Archer implementation.To learn more about the Archer Exchange, please visit theArcher Exchangeon the Archer Community.