Click here to close now.




















Welcome!

News Feed Item

EiQ Networks Announces VulnerabilityVue and DiscoveryVue

EiQ Networks, a pioneer in continuous security intelligence, today announced the release of two new freemium security intelligence tools VulnerabilityVue™, a vulnerability analysis solution, and DiscoveryVue™, an asset discovery and management solution.

VulnerabilityVue automates the collection and analysis of vulnerability data from leading vulnerability analysis solutions, providing comprehensive reporting and analysis to automate SANS Critical Security controls implementation and assessment. DiscoveryVue helps companies to detect IT assets on a corporate network and categorize them as authorized or unauthorized nodes. DiscoveryVue helps organizations easily and proactively determine unknown nodes connecting to an organizations network to improve policy enforcement and cyber defenses.

These free and easy-to-deploy continuous security intelligence tools help resource-constrained organizations address security management acquisition and operational complexities and begin building an infrastructure to overcome procurement, deployment and operational challenges associated with traditional security management tools.

“As the frequency and severity of high profile data breaches continues to accelerate, it is critical that companies have an infrastructure in place to quickly identify and act on unauthorized network activity, and continuously diagnose and protect the nodes that are most vulnerable to an attack,” said Brian Mehlman, Senior Director of Product Management at EiQ Networks. “These new freemium products help in advancing continuous security intelligence, essential for cyber security and compliance by automating both vulnerability collection and analysis, and asset discovery and management so that companies can better identify and react to threats and security gaps before they are exploited by hackers.”

With the availability of VulnerabilityVue and DiscoveryVue, EiQ now provides a full suite of freemium tools, including LogVue, EventVue and FlowVue, which deliver centralized log management, event monitoring and network flow analysis.

VulnerabilityVue™

VulnerabilityVue is a vulnerability collection and analysis solution that centralizes vulnerability scan data from leading vulnerability scanners into a single console for easy analysis, reporting and monitoring. The free tool presents vulnerability results from Nessus, Qualys or Rapid 7 scanners in a clear red light/green light presentation to help organizations quickly assess vulnerable systems as recommended by the SANS institute. Users will be able to identify vulnerable systems and obtain appropriate remediation guidance.

DiscoveryVue™

DiscoveryVue from EiQ Networks is an asset discovery solution that uses NMAP to discover and inventory devices operating on an organization’s network. The free tool also provides the ability to create asset policies and continually monitor compliance against defined policy. In addition, users can easily identify authorized and unauthorized devices on their network as recommended by the SANS institute.

To receive a free copy of VulnerabilityVue or DiscoveryVue, or another freemium product from EiQ Networks, visit www.eiqnetworks.com/free-tools.

About EiQ Networks:

EiQ Networks, a pioneer in simplified information security and compliance solutions and services, is transforming how organizations identify threats, mitigate risks and enable compliance. Our flagship solution, SecureVue®, a continuous security intelligence platform, helps organizations proactively detects incidents, implement security best practices, and receive timely and actionable intelligence along with remediation guidance. Through a single console, SecureVue enables a unified view of an organization's entire IT infrastructure for continuous security monitoring, critical security control assessment, configuration auditing, and compliance automation. In addition, EiQ offers SOCVue, a security monitoring software as a service (SaaS) offering, provides 24x7 security operations to organizations that require security monitoring but lack resources or on-staff expertise to implement an effective security program. For more information, visit: http://www.eiqnetworks.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The web app is agile. The REST API is agile. The testing and planning are agile. But alas, data infrastructures certainly are not. Once an application matures, changing the shape or indexing scheme of data often forces at best a top down planning exercise and at worst includes schema changes that force downtime. The time has come for a new approach that fundamentally advances the agility of distributed data infrastructures. Come learn about a new solution to the problems faced by software organ...
With the Apple Watch making its way onto wrists all over the world, it’s only a matter of time before it becomes a staple in the workplace. In fact, Forrester reported that 68 percent of technology and business decision-makers characterize wearables as a top priority for 2015. Recognizing their business value early on, FinancialForce.com was the first to bring ERP to wearables, helping streamline communication across front and back office functions. In his session at @ThingsExpo, Kevin Roberts...
Red Hat is investing in Tesora, the number one contributor to OpenStack Trove Database as a Service (DBaaS) also ranked among the top 20 companies contributing to OpenStack overall. Tesora, the company bringing OpenStack Trove Database as a Service (DBaaS) to the enterprise, has announced that Red Hat and others have invested in the company as a part of Tesora's latest funding round. The funding agreement expands on the ongoing collaboration between Tesora and Red Hat, which dates back to Febr...
Even though you are running an agile development process, that doesn’t necessarily mean that your performance testing is being conducted in a truly agile way. Saving performance testing for a “final sprint” before release still treats it like a waterfall development step, with all the cost and risk that comes with that. In this post, we will show you how to make load testing happen early and often by putting SLAs on the agile task board.
Manufacturing connected IoT versions of traditional products requires more than multiple deep technology skills. It also requires a shift in mindset, to realize that connected, sensor-enabled “things” act more like services than what we usually think of as products. In his session at @ThingsExpo, David Friedman, CEO and co-founder of Ayla Networks, will discuss how when sensors start generating detailed real-world data about products and how they’re being used, smart manufacturers can use the ...
This Enterprise Strategy Group lab validation report of the NEC Express5800/R320 server with Intel® Xeon® processor presents the benefits of 99.999% uptime NEC fault-tolerant servers that lower overall virtualized server total cost of ownership. This report also includes survey data on the significant costs associated with system outages impacting enterprise and web applications. Click Here to Download Report Now!
The Internet of Things is in the early stages of mainstream deployment but it promises to unlock value and rapidly transform how organizations manage, operationalize, and monetize their assets. IoT is a complex structure of hardware, sensors, applications, analytics and devices that need to be able to communicate geographically and across all functions. Once the data is collected from numerous endpoints, the challenge then becomes converting it into actionable insight.
Contrary to mainstream media attention, the multiple possibilities of how consumer IoT will transform our everyday lives aren’t the only angle of this headline-gaining trend. There’s a huge opportunity for “industrial IoT” and “Smart Cities” to impact the world in the same capacity – especially during critical situations. For example, a community water dam that needs to release water can leverage embedded critical communications logic to alert the appropriate individuals, on the right device, as...
U.S. companies are desperately trying to recruit and hire skilled software engineers and developers, but there is simply not enough quality talent to go around. Tiempo Development is a nearshore software development company. Our headquarters are in AZ, but we are a pioneer and leader in outsourcing to Mexico, based on our three software development centers there. We have a proven process and we are experts at providing our customers with powerful solutions. We transform ideas into reality.
As more intelligent IoT applications shift into gear, they’re merging into the ever-increasing traffic flow of the Internet. It won’t be long before we experience bottlenecks, as IoT traffic peaks during rush hours. Organizations that are unprepared will find themselves by the side of the road unable to cross back into the fast lane. As billions of new devices begin to communicate and exchange data – will your infrastructure be scalable enough to handle this new interconnected world?
eCube Systems has released NXTmonitor, a full featured application orchestration solution. NXTmonitor, which inherited the code base of NXTminder, has been extended to support multi-discipline processes and will act as a DevOps utility in a heterogeneous enterprise environment. Previously, NXTminder was packaged with NXTera middleware to configure and manage Entera and NXTera RPC servers. “Since we are widening the focus of this solution to DevOps, we felt the need to change the name to NXTmon...
Advances in technology and ubiquitous connectivity have made the utilization of a dispersed workforce more common. Whether that remote team is located across the street or country, management styles/ approaches will have to be adjusted to accommodate this new dynamic. In his session at 17th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on the challenges of managing remote teams, providing real-world examples that demonstrate what works and what...
17th Cloud Expo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterprises ar...
Moving an existing on-premise infrastructure into the cloud can be a complex and daunting proposition. It is critical to understand the benefits as well as the challenges associated with either a full or hybrid approach. In his session at 17th Cloud Expo, Richard Weiss, Principal Consultant at Pythian, will present a roadmap that can be leveraged by any organization to plan, analyze, evaluate and execute on a cloud migration solution. He will review the five major cloud transformation phases a...
While many app developers are comfortable building apps for the smartphone, there is a whole new world out there. In his session at @ThingsExpo, Narayan Sainaney, Co-founder and CTO of Mojio, will discuss how the business case for connected car apps is growing and, with open platform companies having already done the heavy lifting, there really is no barrier to entry.