ThreatWatch Integration

Document created by Gloria Higley Employee on Jan 22, 2020Last modified by Susan Read-Miller on Apr 21, 2020
Version 11Show Document
  • View in full screen mode

ThreatWatch Logo


ThreatWatch is a pro-active cyber security solution that uses an AI powered vulnerability curation and no scan approach for impact assessment of assets including source code, containers, cloud instances, and servers.

 

The ThreatWatch integration takes vulnerability intelligence and impacts from ThreatWatch and feeds them into the RSA Archer IT Security Vulnerabilities Program (ITSVP) use case in RSA Archer, enabling organizations to access near real-time vulnerability intelligence along with continuous impact assessment of organizational assets. ThreatWatch shares product, patch and remediation information and pro-actively shares vulnerability impact information without the need for any scans on assets. ThreatWatch automatically classifies impact to provide actionable insights to SecOps teams like DoNow or DoLater and impact information is completely actionable with patch and remediation details to cover the last mile.

 

Integration Features

ThreatWatch integration with RSA Archer enables organizations to:

  • Access near real-time vulnerability intelligence with automatic risk prioritization made available in RSA Archer
  • Obtain pro-active no scan-based impact assessment for different kinds of assets in RSA Archer
  • Easily generate reports and findings from the latest vulnerability intelligence
  • Provide management with the information they need, including which vulnerability impacts are critical and need to be addressed based on priority

 

Solution and Platform Information

 

For More Information

To learn more about the ThreatWatch RSA Ready certified integration:

 

For Additional Support

To learn more about ThreatWatch, please contact info@threatwatch.io or 800.916.1241. For technical support questions, please contact support@threatwatch.io or 800.916.1241.

Attachments

    Outcomes