Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":2207,"date":"2024-01-23T14:56:20","date_gmt":"2024-01-23T14:56:20","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/"},"modified":"2024-01-23T14:56:20","modified_gmt":"2024-01-23T14:56:20","slug":"using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/","title":{"rendered":"Using Data Connectors for a Consolidated View of Risk in Cisco Vulnerability Management\u00a0\u00a0\u00a0 Tori Burinskiy on January 23, 2024 at 1:00 pm"},"content":{"rendered":"

Protecting your organization against cyber threats is a top priority. It\u2019s no secret that data breaches and security vulnerabilities can wreak havoc on businesses. The key to safeguarding your o\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b<\/p>\n

Protecting your organization against cyber threats is a top priority. It\u2019s no secret that data breaches and security vulnerabilities can wreak havoc on businesses. The key to safeguarding your organization? Understanding your risk landscape and taking proactive measures to protect your assets.<\/p>\n

In this blog post, we\u2019ll dive into Cisco Vulnerability Management\u2019s ability to ingest asset, vulnerability, and fix data from third-party security tools, providing you with a centralized view of risk for effective prioritization and remediation. We\u2019ll also share details on our latest native connector with Rapid7 InsightVM.<\/p>\n

Cisco Vulnerability Management: A Brief Overview \u00a0<\/strong><\/h2>\n

Cisco Vulnerability Management<\/a> is a risk-based vulnerability management SaaS solution that enables effective vulnerability prioritization through the transformative power of data science. It can ingest security data from a variety of third-party tools, including scanners, asset discovery tools, web application security tools, static and dynamic application security testing tools, bug bounties, and more. In doing so, Cisco Vulnerability Management ensures you have a consolidated, holistic view of security risk across your organization.<\/p>\n

Using proven data science techniques like machine learning, natural language processing, and predictive modeling, Cisco Vulnerability Management assesses, prioritizes, and even predicts risk. These approaches allow us to dynamically calculate the risk of every vulnerability and group of assets to enable security and IT teams to prioritize the risk in their environments that matters most. Remediation guidance and workflow integrations with ticketing systems like Jira and ServiceNow then help teams efficiently carry out remediation efforts to ultimately reduce risk.<\/p>\n

New Connectors for Cisco Vulnerability Management<\/strong><\/h2>\n

Cisco Vulnerability Management offers a variety of native and toolkit connectors<\/a> to bring security data into one place for effective risk-based vulnerability management.<\/p>\n

Rapid7 InsightVM Connector for Cisco Vulnerability Management <\/strong><\/p>\n

Our latest native connector is with the Rapid7 cloud-based vulnerability management solution, InsightVM. Customers of both solutions can use this connector to ingest asset, vulnerability, and fix data from InsightVM into Cisco Vulnerability Management. Combining this ingested data with data from your other security tools in Cisco Vulnerability Management gives you a consolidated view of risk to implement effective prioritization and remediation. For guidance on setting up the InsightVM connector, see our help documentation.<\/a>\u00a0<\/p>\n

Cisco Vulnerability Management already has an established connector with Nexpose<\/a>, Rapid7\u2019s on-premises vulnerability scanner. For customers who are currently using the Nexpose connector, but are planning to migrate to the InsightVM connector, our team has documented migration steps<\/a>.\u00a0\u00a0\u00a0\u00a0\u00a0<\/p>\n

Benefits of Ingesting Security Data into Cisco Vulnerability Management<\/strong><\/h2>\n

Gain a Centralized View of Risk<\/strong><\/h3>\n

Cyber threats evolve rapidly, and your risk landscape changes accordingly. Consolidating your asset and vulnerability data from scanners, vulnerability management tools, asset discovery tools, SAST & DAST tools, bug bounties and pen-test findings into Cisco Vulnerability Management gives you a comprehensive view of your organization\u2019s risk. Having a centralized view not only makes it easier to identify vulnerabilities but also helps you pinpoint the most critical ones. You can assess the potential impact on your organization and prioritize accordingly.<\/p>\n

Adopt Effective Prioritization<\/strong><\/h3>\n

Once you have all your data in one place, the next step is to prioritize vulnerabilities that pose the greatest risk to your organization. The Cisco Security Risk Score (formerly Kenna Risk Score) in Cisco Vulnerability Management is assigned to every CVE, CWE, and WASC in your environment.<\/p>\n

Leveraging ground truth telemetry and an extensive amount of internal security data, the Cisco Security Risk Score ties into Cisco Vulnerability Management\u2019s predictive model to algorithmically determine risk scores for each unique vulnerability, ranging from zero (no risk) to 100 (highest risk). And, in concert with asset criticality scores, Cisco Vulnerability Management determines an actionable risk score for each asset and group of assets that ranges from zero (no risk) to 1000 (highest risk).<\/p>\n

The Cisco Security Risk Score takes into account all of the internal and external variables used in the predictive model that are high indicators of risk. Internal risk calculations factor in the number of instances of each vulnerability in your environment, their potential severity, and the criticality of the assets threatened by each vulnerability. External risk calculations factor in more than just the CVSS score of the vulnerability by also including EPSS, threat intelligence information such as whether or not an exploit kit is available for the vulnerability, the volume and velocity of exploits that take advantage of the vulnerability, and the prevalence of the vulnerability seen throughout customer environments. With accurate and quantifiable risk scores, you will understand your organizations\u2019 current risk posture and identify the actions you can take to reduce the greatest amount of risk.<\/p>\n

Improve the Remediation Process<\/strong><\/h3>\n

Once you\u2019ve identified the vulnerabilities that pose the greatest risk to your organization, you can work to remediate them. Cisco Vulnerability Management helps align security and IT teams by providing evidence-based prioritization and self-service remediation workflows. Teams can reduce risk fast with Top Fix Groups that guide you on which vulnerabilities should be fixed first and their impact on your risk score. And, of course, integrations with ticketing systems like Jira and ServiceNow help make the remediation process even more efficient by automating some of the tedious work.<\/p>\n

Interested in Learning More about Connectors for Cisco Vulnerability Management?<\/strong><\/h2>\n

Check out the Cisco Vulnerability Management Technology Integrations page<\/a> to see a filterable list of available integrations to help you centralize your data and drive effective risk-based vulnerability management. You can also view our downloadable integrations brief<\/a> for more details!<\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social!<\/em><\/p>\n

Cisco Security Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n

\n\t\tShare\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

\u00a0\u00a0Rapid7 InsightVM’s asset, vulnerability, and fix data is ingested into Cisco Vulnerability Management for data centralization and effective risk prioritization.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

<\/p>\n

Protecting your organization against cyber threats is a top priority. It\u2019s no secret that data breaches and security vulnerabilities can wreak havoc on businesses. The key to safeguarding your o\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b<\/p>\n

Protecting your organization against cyber threats is a top priority. It\u2019s no secret that data breaches and security vulnerabilities can wreak havoc on businesses. The key to safeguarding your organization? Understanding your risk landscape and taking proactive measures to protect your assets.<\/p>\n

In this blog post, we\u2019ll dive into Cisco Vulnerability Management\u2019s ability to ingest asset, vulnerability, and fix data from third-party security tools, providing you with a centralized view of risk for effective prioritization and remediation. We\u2019ll also share details on our latest native connector with Rapid7 InsightVM.<\/p>\n

Cisco Vulnerability Management: A Brief Overview \u00a0<\/strong><\/h2>\n

Cisco Vulnerability Management<\/a> is a risk-based vulnerability management SaaS solution that enables effective vulnerability prioritization through the transformative power of data science. It can ingest security data from a variety of third-party tools, including scanners, asset discovery tools, web application security tools, static and dynamic application security testing tools, bug bounties, and more. In doing so, Cisco Vulnerability Management ensures you have a consolidated, holistic view of security risk across your organization.<\/p>\n

Using proven data science techniques like machine learning, natural language processing, and predictive modeling, Cisco Vulnerability Management assesses, prioritizes, and even predicts risk. These approaches allow us to dynamically calculate the risk of every vulnerability and group of assets to enable security and IT teams to prioritize the risk in their environments that matters most. Remediation guidance and workflow integrations with ticketing systems like Jira and ServiceNow then help teams efficiently carry out remediation efforts to ultimately reduce risk.<\/p>\n

New Connectors for Cisco Vulnerability Management<\/strong><\/h2>\n

Cisco Vulnerability Management offers a variety of native and toolkit connectors<\/a> to bring security data into one place for effective risk-based vulnerability management.<\/p>\n

Rapid7 InsightVM Connector for Cisco Vulnerability Management <\/strong><\/p>\n

Our latest native connector is with the Rapid7 cloud-based vulnerability management solution, InsightVM. Customers of both solutions can use this connector to ingest asset, vulnerability, and fix data from InsightVM into Cisco Vulnerability Management. Combining this ingested data with data from your other security tools in Cisco Vulnerability Management gives you a consolidated view of risk to implement effective prioritization and remediation. For guidance on setting up the InsightVM connector, see our help documentation.<\/a>\u00a0<\/p>\n

Cisco Vulnerability Management already has an established connector with Nexpose<\/a>, Rapid7\u2019s on-premises vulnerability scanner. For customers who are currently using the Nexpose connector, but are planning to migrate to the InsightVM connector, our team has documented migration steps<\/a>.\u00a0\u00a0\u00a0\u00a0\u00a0<\/p>\n

Benefits of Ingesting Security Data into Cisco Vulnerability Management<\/strong><\/h2>\n

Gain a Centralized View of Risk<\/strong><\/h3>\n

Cyber threats evolve rapidly, and your risk landscape changes accordingly. Consolidating your asset and vulnerability data from scanners, vulnerability management tools, asset discovery tools, SAST & DAST tools, bug bounties and pen-test findings into Cisco Vulnerability Management gives you a comprehensive view of your organization\u2019s risk. Having a centralized view not only makes it easier to identify vulnerabilities but also helps you pinpoint the most critical ones. You can assess the potential impact on your organization and prioritize accordingly.<\/p>\n

Adopt Effective Prioritization<\/strong><\/h3>\n

Once you have all your data in one place, the next step is to prioritize vulnerabilities that pose the greatest risk to your organization. The Cisco Security Risk Score (formerly Kenna Risk Score) in Cisco Vulnerability Management is assigned to every CVE, CWE, and WASC in your environment.<\/p>\n

Leveraging ground truth telemetry and an extensive amount of internal security data, the Cisco Security Risk Score ties into Cisco Vulnerability Management\u2019s predictive model to algorithmically determine risk scores for each unique vulnerability, ranging from zero (no risk) to 100 (highest risk). And, in concert with asset criticality scores, Cisco Vulnerability Management determines an actionable risk score for each asset and group of assets that ranges from zero (no risk) to 1000 (highest risk).<\/p>\n

The Cisco Security Risk Score takes into account all of the internal and external variables used in the predictive model that are high indicators of risk. Internal risk calculations factor in the number of instances of each vulnerability in your environment, their potential severity, and the criticality of the assets threatened by each vulnerability. External risk calculations factor in more than just the CVSS score of the vulnerability by also including EPSS, threat intelligence information such as whether or not an exploit kit is available for the vulnerability, the volume and velocity of exploits that take advantage of the vulnerability, and the prevalence of the vulnerability seen throughout customer environments. With accurate and quantifiable risk scores, you will understand your organizations\u2019 current risk posture and identify the actions you can take to reduce the greatest amount of risk.<\/p>\n

Improve the Remediation Process<\/strong><\/h3>\n

Once you\u2019ve identified the vulnerabilities that pose the greatest risk to your organization, you can work to remediate them. Cisco Vulnerability Management helps align security and IT teams by providing evidence-based prioritization and self-service remediation workflows. Teams can reduce risk fast with Top Fix Groups that guide you on which vulnerabilities should be fixed first and their impact on your risk score. And, of course, integrations with ticketing systems like Jira and ServiceNow help make the remediation process even more efficient by automating some of the tedious work.<\/p>\n

Interested in Learning More about Connectors for Cisco Vulnerability Management?<\/strong><\/h2>\n

Check out the Cisco Vulnerability Management Technology Integrations page<\/a> to see a filterable list of available integrations to help you centralize your data and drive effective risk-based vulnerability management. You can also view our downloadable integrations brief<\/a> for more details!<\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social!<\/em><\/p>\n

Cisco Security Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n

\n\t\tShare<\/p>\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

\u00a0\u00a0Rapid7 InsightVM’s asset, vulnerability, and fix data is ingested into Cisco Vulnerability Management for data centralization and effective risk prioritization.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n

<\/p>\n","protected":false},"author":0,"featured_media":2208,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-2207","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\nUsing Data Connectors for a Consolidated View of Risk in Cisco Vulnerability Management\u00a0\u00a0\u00a0 Tori Burinskiy on January 23, 2024 at 1:00 pm - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Using Data Connectors for a Consolidated View of Risk in Cisco Vulnerability Management\u00a0\u00a0\u00a0 Tori Burinskiy on January 23, 2024 at 1:00 pm\" \/>\n<meta property=\"og:description\" content=\"Protecting your organization against cyber threats is a top priority. It\u2019s no secret that data breaches and security vulnerabilities can wreak havoc on businesses. The key to safeguarding your o\u2026 Read more on Cisco Blogs \u200b Protecting your organization against cyber threats is a top priority. It\u2019s no secret that data breaches and security vulnerabilities can wreak havoc on businesses. The key to safeguarding your organization? Understanding your risk landscape and taking proactive measures to protect your assets. In this blog post, we\u2019ll dive into Cisco Vulnerability Management\u2019s ability to ingest asset, vulnerability, and fix data from third-party security tools, providing you with a centralized view of risk for effective prioritization and remediation. We\u2019ll also share details on our latest native connector with Rapid7 InsightVM. Cisco Vulnerability Management: A Brief Overview \u00a0 Cisco Vulnerability Management is a risk-based vulnerability management SaaS solution that enables effective vulnerability prioritization through the transformative power of data science. It can ingest security data from a variety of third-party tools, including scanners, asset discovery tools, web application security tools, static and dynamic application security testing tools, bug bounties, and more. In doing so, Cisco Vulnerability Management ensures you have a consolidated, holistic view of security risk across your organization. Using proven data science techniques like machine learning, natural language processing, and predictive modeling, Cisco Vulnerability Management assesses, prioritizes, and even predicts risk. These approaches allow us to dynamically calculate the risk of every vulnerability and group of assets to enable security and IT teams to prioritize the risk in their environments that matters most. Remediation guidance and workflow integrations with ticketing systems like Jira and ServiceNow then help teams efficiently carry out remediation efforts to ultimately reduce risk. New Connectors for Cisco Vulnerability Management Cisco Vulnerability Management offers a variety of native and toolkit connectors to bring security data into one place for effective risk-based vulnerability management. Rapid7 InsightVM Connector for Cisco Vulnerability Management Our latest native connector is with the Rapid7 cloud-based vulnerability management solution, InsightVM. Customers of both solutions can use this connector to ingest asset, vulnerability, and fix data from InsightVM into Cisco Vulnerability Management. Combining this ingested data with data from your other security tools in Cisco Vulnerability Management gives you a consolidated view of risk to implement effective prioritization and remediation. For guidance on setting up the InsightVM connector, see our help documentation.\u00a0 Cisco Vulnerability Management already has an established connector with Nexpose, Rapid7\u2019s on-premises vulnerability scanner. For customers who are currently using the Nexpose connector, but are planning to migrate to the InsightVM connector, our team has documented migration steps.\u00a0\u00a0\u00a0\u00a0\u00a0 Benefits of Ingesting Security Data into Cisco Vulnerability Management Gain a Centralized View of Risk Cyber threats evolve rapidly, and your risk landscape changes accordingly. Consolidating your asset and vulnerability data from scanners, vulnerability management tools, asset discovery tools, SAST & DAST tools, bug bounties and pen-test findings into Cisco Vulnerability Management gives you a comprehensive view of your organization\u2019s risk. Having a centralized view not only makes it easier to identify vulnerabilities but also helps you pinpoint the most critical ones. You can assess the potential impact on your organization and prioritize accordingly. Adopt Effective Prioritization Once you have all your data in one place, the next step is to prioritize vulnerabilities that pose the greatest risk to your organization. The Cisco Security Risk Score (formerly Kenna Risk Score) in Cisco Vulnerability Management is assigned to every CVE, CWE, and WASC in your environment. Leveraging ground truth telemetry and an extensive amount of internal security data, the Cisco Security Risk Score ties into Cisco Vulnerability Management\u2019s predictive model to algorithmically determine risk scores for each unique vulnerability, ranging from zero (no risk) to 100 (highest risk). And, in concert with asset criticality scores, Cisco Vulnerability Management determines an actionable risk score for each asset and group of assets that ranges from zero (no risk) to 1000 (highest risk). The Cisco Security Risk Score takes into account all of the internal and external variables used in the predictive model that are high indicators of risk. Internal risk calculations factor in the number of instances of each vulnerability in your environment, their potential severity, and the criticality of the assets threatened by each vulnerability. External risk calculations factor in more than just the CVSS score of the vulnerability by also including EPSS, threat intelligence information such as whether or not an exploit kit is available for the vulnerability, the volume and velocity of exploits that take advantage of the vulnerability, and the prevalence of the vulnerability seen throughout customer environments. With accurate and quantifiable risk scores, you will understand your organizations\u2019 current risk posture and identify the actions you can take to reduce the greatest amount of risk. Improve the Remediation Process Once you\u2019ve identified the vulnerabilities that pose the greatest risk to your organization, you can work to remediate them. Cisco Vulnerability Management helps align security and IT teams by providing evidence-based prioritization and self-service remediation workflows. Teams can reduce risk fast with Top Fix Groups that guide you on which vulnerabilities should be fixed first and their impact on your risk score. And, of course, integrations with ticketing systems like Jira and ServiceNow help make the remediation process even more efficient by automating some of the tedious work. Interested in Learning More about Connectors for Cisco Vulnerability Management? Check out the Cisco Vulnerability Management Technology Integrations page to see a filterable list of available integrations to help you centralize your data and drive effective risk-based vulnerability management. You can also view our downloadable integrations brief for more details! We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social! Cisco Security Social Channels InstagramFacebookTwitterLinkedIn Share Share: \u00a0\u00a0Rapid7 InsightVM's asset, vulnerability, and fix data is ingested into Cisco Vulnerability Management for data centralization and effective risk prioritization.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-23T14:56:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/16544560-lfdanC.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Using Data Connectors for a Consolidated View of Risk in Cisco Vulnerability Management\u00a0\u00a0\u00a0 Tori Burinskiy on January 23, 2024 at 1:00 pm\",\"datePublished\":\"2024-01-23T14:56:20+00:00\",\"dateModified\":\"2024-01-23T14:56:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/\"},\"wordCount\":1010,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/16544560-lfdanC.gif\",\"articleSection\":[\"Cisco: Learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/\",\"name\":\"Using Data Connectors for a Consolidated View of Risk in Cisco Vulnerability Management\u00a0\u00a0\u00a0 Tori Burinskiy on January 23, 2024 at 1:00 pm - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/16544560-lfdanC.gif\",\"datePublished\":\"2024-01-23T14:56:20+00:00\",\"dateModified\":\"2024-01-23T14:56:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/16544560-lfdanC.gif\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/16544560-lfdanC.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Using Data Connectors for a Consolidated View of Risk in Cisco Vulnerability Management\u00a0\u00a0\u00a0 Tori Burinskiy on January 23, 2024 at 1:00 pm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Using Data Connectors for a Consolidated View of Risk in Cisco Vulnerability Management\u00a0\u00a0\u00a0 Tori Burinskiy on January 23, 2024 at 1:00 pm - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/","og_locale":"en_US","og_type":"article","og_title":"Using Data Connectors for a Consolidated View of Risk in Cisco Vulnerability Management\u00a0\u00a0\u00a0 Tori Burinskiy on January 23, 2024 at 1:00 pm","og_description":"Protecting your organization against cyber threats is a top priority. It\u2019s no secret that data breaches and security vulnerabilities can wreak havoc on businesses. The key to safeguarding your o\u2026 Read more on Cisco Blogs \u200b Protecting your organization against cyber threats is a top priority. It\u2019s no secret that data breaches and security vulnerabilities can wreak havoc on businesses. The key to safeguarding your organization? Understanding your risk landscape and taking proactive measures to protect your assets. In this blog post, we\u2019ll dive into Cisco Vulnerability Management\u2019s ability to ingest asset, vulnerability, and fix data from third-party security tools, providing you with a centralized view of risk for effective prioritization and remediation. We\u2019ll also share details on our latest native connector with Rapid7 InsightVM. Cisco Vulnerability Management: A Brief Overview \u00a0 Cisco Vulnerability Management is a risk-based vulnerability management SaaS solution that enables effective vulnerability prioritization through the transformative power of data science. It can ingest security data from a variety of third-party tools, including scanners, asset discovery tools, web application security tools, static and dynamic application security testing tools, bug bounties, and more. In doing so, Cisco Vulnerability Management ensures you have a consolidated, holistic view of security risk across your organization. Using proven data science techniques like machine learning, natural language processing, and predictive modeling, Cisco Vulnerability Management assesses, prioritizes, and even predicts risk. These approaches allow us to dynamically calculate the risk of every vulnerability and group of assets to enable security and IT teams to prioritize the risk in their environments that matters most. Remediation guidance and workflow integrations with ticketing systems like Jira and ServiceNow then help teams efficiently carry out remediation efforts to ultimately reduce risk. New Connectors for Cisco Vulnerability Management Cisco Vulnerability Management offers a variety of native and toolkit connectors to bring security data into one place for effective risk-based vulnerability management. Rapid7 InsightVM Connector for Cisco Vulnerability Management Our latest native connector is with the Rapid7 cloud-based vulnerability management solution, InsightVM. Customers of both solutions can use this connector to ingest asset, vulnerability, and fix data from InsightVM into Cisco Vulnerability Management. Combining this ingested data with data from your other security tools in Cisco Vulnerability Management gives you a consolidated view of risk to implement effective prioritization and remediation. For guidance on setting up the InsightVM connector, see our help documentation.\u00a0 Cisco Vulnerability Management already has an established connector with Nexpose, Rapid7\u2019s on-premises vulnerability scanner. For customers who are currently using the Nexpose connector, but are planning to migrate to the InsightVM connector, our team has documented migration steps.\u00a0\u00a0\u00a0\u00a0\u00a0 Benefits of Ingesting Security Data into Cisco Vulnerability Management Gain a Centralized View of Risk Cyber threats evolve rapidly, and your risk landscape changes accordingly. Consolidating your asset and vulnerability data from scanners, vulnerability management tools, asset discovery tools, SAST & DAST tools, bug bounties and pen-test findings into Cisco Vulnerability Management gives you a comprehensive view of your organization\u2019s risk. Having a centralized view not only makes it easier to identify vulnerabilities but also helps you pinpoint the most critical ones. You can assess the potential impact on your organization and prioritize accordingly. Adopt Effective Prioritization Once you have all your data in one place, the next step is to prioritize vulnerabilities that pose the greatest risk to your organization. The Cisco Security Risk Score (formerly Kenna Risk Score) in Cisco Vulnerability Management is assigned to every CVE, CWE, and WASC in your environment. Leveraging ground truth telemetry and an extensive amount of internal security data, the Cisco Security Risk Score ties into Cisco Vulnerability Management\u2019s predictive model to algorithmically determine risk scores for each unique vulnerability, ranging from zero (no risk) to 100 (highest risk). And, in concert with asset criticality scores, Cisco Vulnerability Management determines an actionable risk score for each asset and group of assets that ranges from zero (no risk) to 1000 (highest risk). The Cisco Security Risk Score takes into account all of the internal and external variables used in the predictive model that are high indicators of risk. Internal risk calculations factor in the number of instances of each vulnerability in your environment, their potential severity, and the criticality of the assets threatened by each vulnerability. External risk calculations factor in more than just the CVSS score of the vulnerability by also including EPSS, threat intelligence information such as whether or not an exploit kit is available for the vulnerability, the volume and velocity of exploits that take advantage of the vulnerability, and the prevalence of the vulnerability seen throughout customer environments. With accurate and quantifiable risk scores, you will understand your organizations\u2019 current risk posture and identify the actions you can take to reduce the greatest amount of risk. Improve the Remediation Process Once you\u2019ve identified the vulnerabilities that pose the greatest risk to your organization, you can work to remediate them. Cisco Vulnerability Management helps align security and IT teams by providing evidence-based prioritization and self-service remediation workflows. Teams can reduce risk fast with Top Fix Groups that guide you on which vulnerabilities should be fixed first and their impact on your risk score. And, of course, integrations with ticketing systems like Jira and ServiceNow help make the remediation process even more efficient by automating some of the tedious work. Interested in Learning More about Connectors for Cisco Vulnerability Management? Check out the Cisco Vulnerability Management Technology Integrations page to see a filterable list of available integrations to help you centralize your data and drive effective risk-based vulnerability management. You can also view our downloadable integrations brief for more details! We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social! Cisco Security Social Channels InstagramFacebookTwitterLinkedIn Share Share: \u00a0\u00a0Rapid7 InsightVM's asset, vulnerability, and fix data is ingested into Cisco Vulnerability Management for data centralization and effective risk prioritization.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0","og_url":"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/","og_site_name":"JHC","article_published_time":"2024-01-23T14:56:20+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/16544560-lfdanC.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/"},"author":{"name":"","@id":""},"headline":"Using Data Connectors for a Consolidated View of Risk in Cisco Vulnerability Management\u00a0\u00a0\u00a0 Tori Burinskiy on January 23, 2024 at 1:00 pm","datePublished":"2024-01-23T14:56:20+00:00","dateModified":"2024-01-23T14:56:20+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/"},"wordCount":1010,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/16544560-lfdanC.gif","articleSection":["Cisco: Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/","url":"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/","name":"Using Data Connectors for a Consolidated View of Risk in Cisco Vulnerability Management\u00a0\u00a0\u00a0 Tori Burinskiy on January 23, 2024 at 1:00 pm - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/16544560-lfdanC.gif","datePublished":"2024-01-23T14:56:20+00:00","dateModified":"2024-01-23T14:56:20+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/16544560-lfdanC.gif","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/16544560-lfdanC.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/using-data-connectors-for-a-consolidated-view-of-risk-in-cisco-vulnerability-management-tori-burinskiy-on-january-23-2024-at-100-pm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Using Data Connectors for a Consolidated View of Risk in Cisco Vulnerability Management\u00a0\u00a0\u00a0 Tori Burinskiy on January 23, 2024 at 1:00 pm"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=2207"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2207\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/2208"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=2207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=2207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=2207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}