IT Brief India - Technology news for CIOs & IT decision-makers
Story image

ThreatAware unveils Version 3.0 of its cyber security platform

Yesterday

ThreatAware has announced the launch of Version 3.0 of its Cyber Asset Attack Surface Management (CAASM) platform.

The platform aims to provide enhanced visibility and protection for an organisation's devices, allowing for the remediation of security issues and uncovering previously unknown devices. The company highlights the platform's ability to transform the way organisations discover devices and manage IT assets and security tools.

Using patent-pending timeline matching technology, ThreatAware's platform provides real-time monitoring of devices accessing corporate networks. This ensures that security controls are both deployed and functioning as planned. The platform offers a comprehensive view of IT infrastructure on a single screen, helping to uncover hidden risks and identify previously invisible devices, pivotal for reducing an organisation's attack surface.

By integrating with existing security tools, ThreatAware standardises data collection via APIs, allowing organisations to account for every asset they have, including those that previously lacked security controls. The platform's agentless deployment can be completed in under 30 minutes without complex configurations, ensuring instant visibility for IT and security teams.

The latest iteration of ThreatAware's platform includes several enhancements designed to increase its power, flexibility, and visibility, particularly important in the increasingly fragmented IT landscapes many organisations contend with today. The system's continuous monitoring and comprehensive cyber risk reports aid organisations in achieving regulatory compliance and making informed decisions.

Key features introduced in Version 3.0 include improved stealth device tracking, offering a novel approach to device discovery through timeline fingerprinting of device activities. This function helps identify unknown devices logging onto the network, significantly improving device visibility.

ThreatAware's data indicates that on average, 15% of devices have gaps in security controls. Organisations often discover 30% more devices accessing corporate data than were previously identified.

With the new 'Action Centre', the platform facilitates easier tracking and resolution of security issues by allowing teams to automate and assign tasks while providing complete workflow visibility from identification to resolution.

ThreatAware also offers enhanced data control, customisation, and enriched data through its timeline matching technology. This ensures a real-time asset inventory, with customisable tagging to offer a clear view of the IT estate, helping organisations to better prioritise risks.

Jon Abbott, CEO and Co-founder of ThreatAware, commented on the launch saying, "Finding and managing all assets across a fragmented IT landscape in which cloud computing and remote access expand the attack surface, is a huge challenge for all organisations. It only takes one unprotected device, one misconfigured control, or one forgotten asset to create an entry point for attackers. That's why ThreatAware is committed to delivering 100% accuracy and visibility across your IT estate. The power of the platform is not just in the information we track, it's how we aggregate and analyse this information to highlight risks that simply wouldn't otherwise be visible."

He further noted, "Cyber risk is no longer just an IT concern, it's a critical business issue. Organisations need to have the right tools not only to prepare for cyber threats but also to withstand and recover from disruption, should an attack strike. The latest version of our platform underscores our commitment to supporting organisations with new features and insights which improve efficiencies and workflows and, ultimately, reduce security risks."

Follow us on:
Follow us on LinkedIn Follow us on X
Share on:
Share on LinkedIn Share on X