Organizations looking for a way to scan their production environment for vulnerabilities without disrupting it have an option in Cohesity’s recently launched CyberScan application.
Many organizations don’t scan for vulnerabilities, and at least one study shows most organizations that suffered a data breach in the past two years are pointing the finger at unpatched vulnerabilities. Raj Dutt, director of product marketing at Cohesity, said the new application gives partners and customers a simple way to adopt preemptive monitoring tools.
“Gaining visibility are information are the first steps towards properly defending against any potential cyber threat,” Dutt told CDN shortly after the application was released last week. “So unless you know there is a hole you cannot fix it and that’s what we’re trying to do here with Tenable.”
The Cohesity CyberScan application is generally available to all Cohesity customers through the Cohesity Marketplace, and is also part of the recent Pegasus 6.4 patch. It was initially born out of the advances in the Pegasus 6.3 patch released February, which allowed third-party applications to run directly on the platform itself.
The new vulnerability scanning engine comes from Tenable, one of the third-party vendors that’s running its apps on Cohesity. Ray Komar, vice-president of technical alliances at Tenable, said CyberScan is an industry-first in the backup space.
“This is the first application we’ve seen that focuses on assessing systems for exposures, such as vulnerabilities, within backup data,” he said in a press release.
Additionally, the CyberScan helps IT professionals perform backup verification, ensuring that a given backup snapshot is recoverable. It also remove the risk of re-injecting known or previously addressed vulnerabilities back into the production environment when performing a recovery job.
The new app should be strongly considered by partners looking for a way into the security marketplace.
“We’re giving them a way to get into the security side of the house, or talk to the security expert within their established base.”