News
News
3/21/2006
02:28 PM
Connect Directly
RSS
E-Mail
50%
50%

VeriSign Service Catalogs, Ranks Cyberthreats

The Security Risk Profiling Service delves down to the device level, including firewalls and routers, and fingers the threats to the network. The service then cranks out a risk score at the device, business unit, or enterprise level.

VeriSign on Tuesday launched a new service that pinpoints vulnerable parts of a business's digital infrastructure.

The Security Risk Profiling Service delves down to the device level -- looking at firewalls, routers, and vulnerability management systems -- and fingers the threats to the network and its vulnerabilities, then cranks out a risk score at the device-, business unit-, or enterprise-level.

Using technology from Skybox Security, a privately-held San Jose, Calif. company, the profiling service provides a complete map of all network assets, runs vulnerability simulation models, and analyzes the data before generating risk scores from a matrix.

VeriSign will also monitor the network for developing threats and provide early warnings via its iDefense security intelligence arm.

"Organizations currently pull available information manually from disparate systems. A service such as VeriSign's can assist in automating the collection and presentation of vital intelligence and support proactive risk and compliance decisions," said Allan Carey, an IDC analyst, in a statement accompanying the service's launch.

The service is available immediately. More information is available on the VeriSign site.

Comment  | 
Print  | 
More Insights
The Business of Going Digital
The Business of Going Digital
Digital business isn't about changing code; it's about changing what legacy sales, distribution, customer service, and product groups do in the new digital age. It's about bringing big data analytics, mobile, social, marketing automation, cloud computing, and the app economy together to launch new products and services. We're seeing new titles in this digital revolution, new responsibilities, new business models, and major shifts in technology spending.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - July 22, 2014
Sophisticated attacks demand real-time risk management and continuous monitoring. Here's how federal agencies are meeting that challenge.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.