Contactez-nous Suivez-nous sur Twitter En francais English Language

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN



Secureworks Leads with Advanced Integration of Threat Detection and Vulnerability Risk for Expedited Threat Resolution

April 2024 by Patrick LEBRETON

Newest innovation breaks down silos for threat and vulnerability prioritization creating a unified experience for IT and SecOps teams

Secureworks® announce the ability to integrate vulnerability risk context with threat detection to prevent attackers from exploiting known vulnerabilities and expedite response times, improving an organization’s security posture. The integration between Taegis™ XDR and Taegis VDR enables customers and partners to view known vulnerabilities in the context of threat data to accelerate investigation and remediation plans. Taegis is the first security platform to link the two worlds - risk-based vulnerability management with superior threat detection and response.

Vulnerabilities account for one-third of breaches according to the Secureworks Counter Threat Unit™ (CTU™). Despite this, threat detection and response and vulnerability management functions have historically operated in silos, creating security blind spots. By integrating vulnerability context and workflows with threat detection, investigation, and response activities into a single view, Secureworks closes these gaps for IT and SecOps teams. As a result, Taegis creates a more resilient and responsive security environment for analysts to prevent, detect, prioritize and respond to threats, ultimately reducing risk to organizations.

Secureworks is committed to building open solutions and starting today, customers can utilize the Taegis Vulnerability Scanner or ingest data from third-party vulnerability scanners to optimize flexibility and existing investments. Ingesting data from additional third-party vulnerability scanners will further improve visibility and enhance the richness of available vulnerability context.

Taegis VDR and Taegis XDR both use Machine Learning (ML)-based prioritization algorithms to continuously improve over time. The combination of the two systems into a single, integrated platform improves upon both use cases by sharing additional information about assets that are vulnerable and those that are observing malicious activity. It also eliminates the need for security analysts to swivel between toolsets when examining the risks posed by vulnerabilities and threats, which can be a manual and time-consuming process. Leveraging a unified platform that can ingest and correlate data from both sources allows security analysts to achieve more detailed and rapid analyses. This, in turn, facilitates swifter remediation actions that not only halt adversaries but also strengthen the organization’s defenses against future threats.

See previous articles


See next articles

Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55

All new podcasts