NormShield Blog

Graphics Needs Satisfied

Graphics Needs Satisfied

Graphics Needs Satisfied; One of the most important yet difficult areas of information security is to show the value of it. Upon an incident the information security awareness is on crest. On the other hand when everything goes smooth and there isn’t any known incidents the awareness slope approaches to, well, not zero maybe but […]

Rapid Cyber Risk Scorecard

Express Yourself by Comparing Vulnerabilities

Express Yourself by Comparing Vulnerabilities; Penetration tests result in reports, that’s the usual output. But when having more than one penetration tests, it’s not that frequent to have a report comparing vulnerabilities found previously/after. In NormShied you can easily produce comparison reports aiming exactly this in seconds. The idea is to see newly found vulnerabilities […]

NormShield Threat Vulnerability Orchestration

Vulnerability One Stop Shop

Vulnerability; What would you expect to see when confronted with a vulnerability in a vulnerability management service? The answers vary of course. However, there are fundamental data and knowledge that shouldn’t be missed when representing a vulnerability; Vulnerability The vulnerability name Generic knowledge defining the vulnerability category in detail The severity of the vulnerability The […]

panoramic asset

360 Degree Panoramic Asset View

Panoramic Asset; NormShield has a panoramic view of your company’s assets including every detail you need. This panoramic view, complementing the list view, includes; alarms, vulnerabilities, services, possible SSL protocol weaknesses, Domain/SSL certificate problems, DNS and other details. Panoramic Asset You can also have an instant risk understanding of the asset by viewing the NormShield […]

The Basics

The Basics

The Basics; Here are some of the key points that NormShield is here to help on your journey of struggling with vulnerabilities; The ability to define and prioritize your assets with the granularity of IP (public and private, yes your DMZ/Intranet IP addresses if you wish so), domain, sub-domain, URL and sub-URL The ability to […]

cms vulnerability

Normalization Of Vulnerability Nomenclature

Finding a vulnerability and naming a vulnerability are two different phenomena. Finding a high-profile high-severity vulnerability requires a clever mind, diligence and of course experience. However, finding an expressive and good name for that vulnerability requires other abilities, that’s for sure. Normalization Of Vulnerability Nomenclature There are many security vulnerability names that don’t really express […]

Security Follows Business

Security Follows Business. And That’s OK

Security Follows Business; Services dynamically evolve with changes, production deployments, application of patches and configuration tweaks. These modifications directly or indirectly affect the stability and security, hence vulnerabilities might be introduced. Periodic and continuous security scans should prevent such vulnerabilities lingering around for a long time for an attacker to take advantage of. Security Follows […]