Tech Intelligence Bulletin (HG Insights) – Cohesity has expanded its security offerings with the release of Cohesity CyberScan, a new application that is the first and only solution that leverages backup data to assess the vulnerabilities, or risk posture, of an enterprise’s IT environment.
This is significant because vulnerabilities often lead to cyberattacks — such as ransomware attacks or data breaches — and discovering these exposures is the first step in defending against online criminals.
Cyber threat identification
Identifying and addressing vulnerabilities has become a major challenge for enterprises today. According to a recent survey, the majority of organizations that suffered a data breach in the past two years say it was caused by a known vulnerability that had not been patched. The survey also found that 37 percent of organizations say they don’t even scan for vulnerabilities.
The Cohesity CyberScan application makes it easy to assess systems for vulnerabilities. Available on the Cohesity MarketPlace, the application works by scanning backup copies on Cohesity DataPlatform (instead of the live production copy) to identify any vulnerabilities across an organization’s IT environment, including the operating system, computer, network devices, and configurations. The application gives a global view of all vulnerabilities through an easy-to-read security dashboard along with actionable recommendations on how to address exposures before hackers exploit them.
Vulnerability management in the Cloud
This application utilizes Tenable.io for vulnerability management in the Cloud to locate exposures against regularly published entries within the public Common Vulnerabilities and Exposures (CVE) database. The application also takes advantage of Cohesity’s unique architecture. This architecture allows organizations to run applications directly on the Cohesity cluster, where the data sits, rather than moving data to a separate application environment.
“This is the first application we’ve seen that focuses on assessing systems for exposures, such as vulnerabilities, within backup data,” said Ray Komar, vice president of technical alliances, Tenable. “We believe this innovative approach provides enterprises with a novel and cutting-edge way to harden and improve their security posture across their IT environments.”
Additionally, the application helps IT professionals perform backup verification, ensuring that a given backup snapshot is recoverable. It also eliminates the risk of re-injecting known or previously addressed vulnerabilities back into the production environment when performing a recovery job.
Frequent scans on backup data
The application also gives organizations the ability to run scans on backup data on a frequent basis, instead of waiting for weeks or months to schedule scans in the production environment, which further reduces opportunities for data breaches. This process does not impact production performance or require that scans be run during a maintenance window.
“Businesses today need an IT environment that runs 24-7 and want to avoid recovering VMs with known vulnerabilities,” said Raj Rajamani, vice president of product management, Cohesity. “While we are focused on empowering customers to make backup data more productive, we are also proud to introduce an industry-first solution that helps customers easily identify exposures, such as vulnerabilities and misconfigurations, without putting any additional burden on their mission-critical operations.”
Send HG Insights your news
Have you got IT news you would like the HG Insights news team to cover? Maybe you have the inside track on a major IT news story or have heard something significant or of interest to the global IT sector. We value all contributions.
Email all press releases / information to firstname.lastname@example.org and one of our journalists will get back to you.