Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

New Tool from EiQ Networks Provides Automated Analysis of SANS Critical Security Controls

EiQ Networks, a provider of security, risk and compliance solutions, this week announced ThreatVue, a security monitoring solution that automates the analysis of essential security controls and provides key security intelligence for organizations.

EiQ Networks, a provider of security, risk and compliance solutions, this week announced ThreatVue, a security monitoring solution that automates the analysis of essential security controls and provides key security intelligence for organizations.

ThreatVue automates the implementation, analysis and remediation guidance of essential security controls as recommended by the Center for Strategic and International Studies (CSIS) and The SANS Institute for effective cyber defenses, the company said.

According to SANS, the US State Department has demonstrated a more than 94% reduction in “measured” security risk through the rigorous automation and measurement of the Top 20 Controls.

According to EiQ Networks, ThreatVue helps organizations get answers to key questions about IT security such as:

• Are there unauthorized nodes on our network?

• Is there any unauthorized software running on our network?

• Are there nodes with vulnerabilities on our network?

• Are there proper malware defense in place on our network?

Advertisement. Scroll to continue reading.

• Are there any unauthorized wireless access points on our network?

• Are there any unauthorized ports & protocols on our network?

• Is there proper event logging in place?

ThreatVue combines traditional Security Information and Event Monitoring (SIEM) data with other critical security data (i.e. network awareness; asset and configuration data).

“ThreatVue enables customers to easily answers questions such as what nodes, users and network activities are not aligned with security best practices, and what should they do to fix potential problem areas,” said Vijay Basani, CEO of EiQ Networks. “ThreatVue addresses deployment and operational complexities, costs and other headaches associated with SIEM and security monitoring products on the market today.”

“SANS Critical Security Controls is an extremely focused, metrics-based strategy for addressing the most common security vulnerabilities,” said Jon Oltsik, senior principal analyst at Enterprise Strategy Group. “Reliance on manual assessment, response, and mitigation has contributed to the poor state of cybersecurity. With the incidents of cybercrimes on the rise, organizations should use guidelines like the SANS Critical Security Controls to help them automate processes and address IT risk.”

More information on ThreatVue is available online

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.