Vulnerability management in the public cloud
Cloud Advisor identifies and prioritizes vulnerabilities in operating systems, packages and libraries on virtual machines and containers deployed in the cloud without the use of agents.
Full coverage in minutes
Cloud Advisor uses an agentless approach to scan virtual machine block storage. This innovative method:
- Provides 100% coverage of all virtual machines and containers immediately after deployment
- Allows you to deploy Cloud Advisor in minutes and get full information about all vulnerabilities in the infrastructure within an hour
- Does not require work to install and update agents, reducing the total cost of ownership
- Has no effect on virtual machine performance
- Does not require a network connection between the virtual machine/container and the scanning module
Attack paths
Cloud Advisor doesn’t just detect vulnerabilities — it analyzes them in the context of the entire cloud environment and identifies dangerous combinations with other security risks, such as public resource exposure, excessive access rights, lateral movement threats, malware, and more.
Based on this data, the product builds attack paths and shows how an attacker could gain access to your critical data. As a result, instead of hundreds of scattered alerts, you get a few priority threat chains with recommendations on how to eliminate them.
For example:
A Log4Shell vulnerability found on a public machine with a security group that allows unrestricted connections will have a higher priority than the same vulnerability found on a machine without internet access.
Similarly, a vulnerability found in a publicly exposed container with elevated privileges, will be prioritized higher than the same vulnerability found in a regular container.
Risk prioritization
In addition to considering the context of the cloud environment to prioritize risks associated with vulnerabilities, Cloud Advisor also takes other factors into account, such as the presence of public exploits, CVSS scores, vulnerability types, etc. This allows you to focus on eliminating real security threats.
Host Configuration
Cloud Advisor identifies insecure virtual machine operating system configurations and provides instructions for remediation. The "Linux CIS Benchmark" rule set developed by the Center of Internet Security is used to test the configuration.
Data sources
Cloud Advisor retrieves data from multiple sources and searches for vulnerabilities in more than 60 operating systems, including various versions of Linux and Windows.