{"id":6748,"date":"2023-10-03T14:07:59","date_gmt":"2023-10-03T12:07:59","guid":{"rendered":"https:\/\/www.faster.cz\/studie\/optimalizace-hrozeb-a-rizik-s-nastroji-rizeni-zranitelnosti\/"},"modified":"2024-08-21T12:11:05","modified_gmt":"2024-08-21T10:11:05","slug":"threat-and-risk-optimization-with-vulnerability-management-tools","status":"publish","type":"studie","link":"https:\/\/www.faster.cz\/en\/study\/threat-and-risk-optimization-with-vulnerability-management-tools\/","title":{"rendered":"Threat and risk optimization with vulnerability management tools"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Customer type<\/h2>\n\n\n\n<p>Freight forwarding and logistics company with 30 employees and a turnover of up to 200 million CZK.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What situation did he deal with<\/h2>\n\n\n\n<p>The customer has been using the services of the monitoring centre for a long time and uses various platforms for its applications, some strictly linked to the client&#8217;s foreign carrier systems. Management is deciding how to <strong>optimally set<\/strong> up data security measures while <strong>effectively setting cybersecurity spending<\/strong>, especially after last year&#8217;s DDoS attack and recurring ransomware.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What we helped with<\/h2>\n\n\n\n<p>After the initial analysis, we identified the systems according to criticality and importance that will be subject to the new setup. We created <strong>standards for a central security setting<\/strong> (hardening) for high security. We set security policy &#8211; technical and procedural regulations based on proven standards for other applications and objects of the internal and external network.<\/p>\n\n\n\n<p>Due to the amount of technologies managed in this way, we proposed the <strong>deployment of a vulnerability management tool<\/strong> (VMS) that <strong>automated<\/strong> the control of compliance with the established security standards and we started to provide the customer with clear <strong>reporting<\/strong> of critical points of the complete IT infrastructure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What the solution brought<\/h2>\n\n\n\n<p>The strategy <strong>eliminated the purchase<\/strong> of security tools and technologies that often caused conflicting effects in terms of confidentiality and data availability. The solution provided the customer with <strong>continuous monitoring of risk and threat status<\/strong>. We walked the customer through a situation in which he faced an attack and taught him how to proceed when anomalies were detected on monitored servers (operating system, databases, web servers, application servers) and HW devices (SCADA, hardware firewalls, WiFi access points, etc.).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Benefits of implementing information risk management<\/h2>\n\n\n\n<ul class=\"wp-block-list is-style-list-square\">\n<li>Significant increase in the level of safety of partial operating systems<\/li>\n\n\n\n<li>Systems are secured at a high level according to international standards and our experience gained from many years of experience in the field of configuring cyber security systems<\/li>\n\n\n\n<li>Risks arising from existing vulnerabilities, configuration mismatches or ICT operations are identified and managed using manual and automated vulnerability management tools<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-btn-square-bordo-fill is-style-btn-bordo-fill\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.faster.cz\/en\/product\/security-operations\/\" target=\"_blank\" rel=\"noreferrer noopener\">Customized solutions<\/a><\/div>\n<\/div>\n","protected":false},"featured_media":0,"template":"","kat":[89],"class_list":["post-6748","studie","type-studie","status-publish","hentry","kat-cyber-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Threat and risk optimization with vulnerability management tools - Faster.cz<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.faster.cz\/en\/study\/threat-and-risk-optimization-with-vulnerability-management-tools\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat and risk optimization with vulnerability management tools - Faster.cz\" \/>\n<meta property=\"og:description\" content=\"Customer type Freight forwarding and logistics company with 30 employees and a turnover of up to 200 million CZK. What situation did he deal with The customer has been using the services of the monitoring centre for a long time and uses various platforms for its applications, some strictly linked to the client&#8217;s foreign carrier [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.faster.cz\/en\/study\/threat-and-risk-optimization-with-vulnerability-management-tools\/\" \/>\n<meta property=\"og:site_name\" content=\"Faster.cz\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Fastercz\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-21T10:11:05+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Fastercz\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.faster.cz\\\/en\\\/study\\\/threat-and-risk-optimization-with-vulnerability-management-tools\\\/\",\"url\":\"https:\\\/\\\/www.faster.cz\\\/en\\\/study\\\/threat-and-risk-optimization-with-vulnerability-management-tools\\\/\",\"name\":\"Threat and risk optimization with vulnerability management tools - Faster.cz\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.faster.cz\\\/#website\"},\"datePublished\":\"2023-10-03T12:07:59+00:00\",\"dateModified\":\"2024-08-21T10:11:05+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.faster.cz\\\/en\\\/study\\\/threat-and-risk-optimization-with-vulnerability-management-tools\\\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.faster.cz\\\/#website\",\"url\":\"https:\\\/\\\/www.faster.cz\\\/\",\"name\":\"Faster.cz\",\"description\":\"...\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.faster.cz\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Threat and risk optimization with vulnerability management tools - Faster.cz","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.faster.cz\/en\/study\/threat-and-risk-optimization-with-vulnerability-management-tools\/","og_locale":"en_US","og_type":"article","og_title":"Threat and risk optimization with vulnerability management tools - Faster.cz","og_description":"Customer type Freight forwarding and logistics company with 30 employees and a turnover of up to 200 million CZK. What situation did he deal with The customer has been using the services of the monitoring centre for a long time and uses various platforms for its applications, some strictly linked to the client&#8217;s foreign carrier [&hellip;]","og_url":"https:\/\/www.faster.cz\/en\/study\/threat-and-risk-optimization-with-vulnerability-management-tools\/","og_site_name":"Faster.cz","article_publisher":"https:\/\/www.facebook.com\/Fastercz\/","article_modified_time":"2024-08-21T10:11:05+00:00","twitter_card":"summary_large_image","twitter_site":"@Fastercz","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.faster.cz\/en\/study\/threat-and-risk-optimization-with-vulnerability-management-tools\/","url":"https:\/\/www.faster.cz\/en\/study\/threat-and-risk-optimization-with-vulnerability-management-tools\/","name":"Threat and risk optimization with vulnerability management tools - Faster.cz","isPartOf":{"@id":"https:\/\/www.faster.cz\/#website"},"datePublished":"2023-10-03T12:07:59+00:00","dateModified":"2024-08-21T10:11:05+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.faster.cz\/en\/study\/threat-and-risk-optimization-with-vulnerability-management-tools\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.faster.cz\/#website","url":"https:\/\/www.faster.cz\/","name":"Faster.cz","description":"...","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.faster.cz\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.faster.cz\/en\/wp-json\/wp\/v2\/studie\/6748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.faster.cz\/en\/wp-json\/wp\/v2\/studie"}],"about":[{"href":"https:\/\/www.faster.cz\/en\/wp-json\/wp\/v2\/types\/studie"}],"wp:attachment":[{"href":"https:\/\/www.faster.cz\/en\/wp-json\/wp\/v2\/media?parent=6748"}],"wp:term":[{"taxonomy":"kat","embeddable":true,"href":"https:\/\/www.faster.cz\/en\/wp-json\/wp\/v2\/kat?post=6748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}