Introducing Real-Time Attack Data to Risk I/O

Today we are announcing the addition of real-time attack data to our Risk I/O vulnerability intelligence platform. With this addition, our vulnerability intelligence platform now offers smarter priority sorting based on real world data, giving insight into where attacks are most likely to occur.

Using a processing engine, Risk I/O correlates live attack data from multiple sources, and prioritizes vulnerabilities based on velocity, exploitation and impact. The result is suggested vulnerabilities to remediate. We think this new feature will save your organization countless hours searching through millions of vulnerabilities to try to understand what to fix first.

To start using this feature, navigate to the Vulnerabilities page in your instance of Risk I/O and simply slide Risk Relevance to “On.” Right away, you’ll notice that the vulnerability table and heads-up display content will update to the highest priority vulnerabilities.

Turning the Risk Relevance slider to “On” will generate the highest priority vulnerabilities.

Once your list is generated, you can use the sliders below to filter your list based on score, severity, threat and priority. The Trending and Top Exploits filters give you additional information on the vulnerabilities that are the most important to address first.

Filter your vulnerability results by a number of factors, including “Trending” and “Top Exploits.”

Think you’ll need to access your search results at another time? Search filters can also be saved for use later.

Risk relevance search filters can be saved for use later.

Give this new feature a spin in your instance of Risk I/O today to better understand your data’s risk relevance. We think you’ll appreciate the time it saves to quickly reduce your risk exposure.  If you don’t already have a Risk I/O account, you can create one for free.