Hackuity, the risk-based vulnerability management provider, announced the launch of Version 2.0 of its next-generation platform, featuring major enhancements to bring further support to organizations in prioritizing risks.

Vulnerability Management 

Hackuity’s intelligent Risk-Based Vulnerability Management combines threat intelligence, vulnerability severity, and unique business context, providing organizations with a quantified, measurable ‘True Risk Score’(TRS), further enhanced for the most accurate insight into risks.

This helps IT teams prioritize threat remediation specific to their attack surfaces and allocate their resources where most needed.

Feature-rich platform

TRS algorithm to significantly reduce the number of critical vulnerabilities that need to be addressed

Unifying and interpreting data sources through integrations with more than 70 market-pioneering tools, the feature-rich platform provides a single pane of glass view for mapping threat exposure. 

This is enhanced by its proprietary TRS algorithm to significantly reduce the number of critical vulnerabilities that need to be addressed urgently, and automate vulnerability-related tasks to streamline teams’ operations. 

Detected CVEs

The latest release comes at a time when the number of detected CVEs (Common Vulnerabilities and Exposures) continues to increase year on year.

In 2022 alone, more than 25,000 new common IT security vulnerabilities and exposures were reported, the highest reported annual figure to date.

Hackuity 2.0 advancements

The major advancements in Hackuity 2.0 help teams to meet these challenges with features including:  

  • TRS brings greater clarity and CVSS noise reduction  

Version 2.0 brings even greater clarity to users further distilling the number of findings

At the core of Hackuity’s platform is its proprietary risk prioritization technology, TRS. Version 2.0 brings even greater clarity to users further distilling down the number of findings teams need to manage, significantly reducing CVSS ‘noise’ by 96%.

Users can switch seamlessly between Legacy CVSS and TRS scoring scales.

  • Additional context on CVEs

The platform provides the deepest encyclopedia of CVEs to date with Smart Exposure Explorer (SmartEx²), analyzing open-source and non-public information to provide contextual KPIs (real exploitability, exploit maturity, threat intensity, EPSS).

This is supported by deeper intelligence and Hackuity’s own Threat Bots leveraging CTI data for improved granularity and a context-rich risk assessment of vulnerabilities.

  • Improved remediation features

Users can apply the role-based access models to remediation campaigns

To streamline and improve the management of teams, users can apply the role-based access models to remediation campaigns.

Scaling vulnerability fixes becomes even easier.

  • Revamped User Interface

The latest release delivers a revamped user interface for ease of use and a new modern design to reflect Hackuity’s forward-thinking identity.

  • New Connectors

Like clockwork, new connectors are launching for Cloud security solutions such as Wiz, Prisma Cloud, and IoT/OT solution Claroty, among many others.

  • SOC 2 Type 1 Compliance

The organization has also achieved SOC 2, Type 1 certification, demonstrating the organization’s ability and commitment to secure client data.

Assess vulnerabilities

The sheer magnitude of CVEs makes it increasingly difficult for IT and security teams to make sense of their data"

Commenting on the launch, Sylvain Cortes, VP of Strategy, at Hackuity said, “The pressure on security teams to quickly risk-assess vulnerabilities is intense."

He adds, "The sheer magnitude of CVEs makes it increasingly difficult for IT and security teams to make sense of their data and this is only going to get more challenging.” 

Identifying cyber risks

Sylvain Cortes continues, “This launch marks a major evolution in the platform and delivers new capabilities to help teams zero in with confidence on the risks that matter to their own business."

He adds, "With the number of vulnerabilities continuing to soar, bringing order to chaos and having the clearest possible view of cyber risks, all in one place has never been more important.” 

Download PDF version Download PDF version

In case you missed it

How Is The Role Of The Manufacturer Changing In Security?
How Is The Role Of The Manufacturer Changing In Security?

Manufacturers make things. That hasn’t changed. Manufacturers today still produce finished goods from raw materials using various tools, equipment, and processes. What is evo...

The Impact of the Cloud on Physical Security: Net-Positive or Net-Negative?
The Impact of the Cloud on Physical Security: Net-Positive or Net-Negative?

Migrating to the Cloud can be a cultural shift for some organizations, especially when it comes to physical security systems. Challenges such as concerns about data security and co...

New Johnson Controls FX90 Supervisory Controller Maximizes Building Automation Performance, Reliability And Flexibility
New Johnson Controls FX90 Supervisory Controller Maximizes Building Automation Performance, Reliability And Flexibility

Johnson Controls, the global pioneer for smart, healthy, and sustainable buildings, launches the Facility Explorer FX90 Supervisory Controller, packed with unique, advanced feature...