Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

New Tool from EiQ Networks Provides Automated Analysis of SANS Critical Security Controls

EiQ Networks, a provider of security, risk and compliance solutions, this week announced ThreatVue, a security monitoring solution that automates the analysis of essential security controls and provides key security intelligence for organizations.

EiQ Networks, a provider of security, risk and compliance solutions, this week announced ThreatVue, a security monitoring solution that automates the analysis of essential security controls and provides key security intelligence for organizations.

ThreatVue automates the implementation, analysis and remediation guidance of essential security controls as recommended by the Center for Strategic and International Studies (CSIS) and The SANS Institute for effective cyber defenses, the company said.

According to SANS, the US State Department has demonstrated a more than 94% reduction in “measured” security risk through the rigorous automation and measurement of the Top 20 Controls.

According to EiQ Networks, ThreatVue helps organizations get answers to key questions about IT security such as:

• Are there unauthorized nodes on our network?

• Is there any unauthorized software running on our network?

• Are there nodes with vulnerabilities on our network?

• Are there proper malware defense in place on our network?

• Are there any unauthorized wireless access points on our network?

• Are there any unauthorized ports & protocols on our network?

• Is there proper event logging in place?

ThreatVue combines traditional Security Information and Event Monitoring (SIEM) data with other critical security data (i.e. network awareness; asset and configuration data).

“ThreatVue enables customers to easily answers questions such as what nodes, users and network activities are not aligned with security best practices, and what should they do to fix potential problem areas,” said Vijay Basani, CEO of EiQ Networks. “ThreatVue addresses deployment and operational complexities, costs and other headaches associated with SIEM and security monitoring products on the market today.”

“SANS Critical Security Controls is an extremely focused, metrics-based strategy for addressing the most common security vulnerabilities,” said Jon Oltsik, senior principal analyst at Enterprise Strategy Group. “Reliance on manual assessment, response, and mitigation has contributed to the poor state of cybersecurity. With the incidents of cybercrimes on the rise, organizations should use guidelines like the SANS Critical Security Controls to help them automate processes and address IT risk.”

More information on ThreatVue is available online

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Expert Insights

Related Content

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.