Attacks resulting in data loss are usually performed by exploiting known and well documented security vulnerabilities in software, network infrastructure, servers, workstations, phone systems, printers and employee devices.
Security flaws are constantly addressed by the vendors who issue security patches and updates on an ongoing basis. In even modest size networks, making sure that all assets are running all the security patches can be a nightmare. A single host that that is missing patches or that didn't get patches installed correctly can compromise the security of the network.
Sherlock enables organizations to proactively protect their data and IT assets without the cost of software or hardware, or hiring additional in-house security experts. Sherlock is a cloud-based suite of IT security and compliance services including vulnerability scanning, asset tagging, web application scanning, PCI and policy compliance management.
Vulnerability scan data from Sherlock or other vulnerability scanning tools can also be easily integrated with Intrisecure’s Watchman service to more accurately prioritize alerts based on known vulnerabilities.
Sherlock provides tools and services to help customer prioritize and track patching and remediation:
Sherlock Vulnerability Management is a fully automated scanning service powered by Qualys:
Built on the world’s leading cloud security and compliance platform, Sherlock frees you from the substantial cost, resource and deployment issues associated with traditional software products. Known for its fast deployment, unparalleled accuracy and scalability, as well as its rich integration with other enterprise systems, Qualys is relied upon by thousands of organizations throughout the world.