Get Context Get Conte
xt
Get Context Get Conte
xt
Get Context Get Context

xTags

Internal and external threat prioritization by contextual factors

Threat analysis and prioritization isn’t a one-size-fits-all deal. CVSS scores don’t consider your organization’s unique infrastructure. Contextual factors play a much larger role in the overall threat of a vulnerability than other risk management solutions take into account.
TOPIA’s xTags give you a real-time, contextually based report that highlights the real threats so your IT and infosec teams can confidently prioritize risk remediation.
Know the real threat with TOPIA’s xTags.

xTags™
Contextual Protection

Each xTag defines a contextual execution property of an application on an asset. xTags™ help prioritize threats using context-based properties like prioritization parameters, access authority and activity status in order to determine the risk level of every application and asset in your organization.

#has_patch

Which Apps are patchable?

#exposed_to_DOS_Attack

If exploited will it expose the asset to a DOS attack?

#high_usage

Which Apps are actually being used?

#network_usage

which of my Assets are communicating with the DMZ and by Which Apps?

#admin_usage

does an App runs with a high privilege user?

#attack_surface

Which Apps contain unknown vulnerabilities?

#tweeted_cves

Which CVE's are popular over Twitter?

#new_vulnerability_published

Which Apps vulnerable to new CVE's within the last 2 monthes?

#known_vulnerability

Which Apps are vulnerable to known CVE's?

#has_exploit

These apps indicate signs of potential vulnerable exploits.

How It Works

Software Structure Analysis

Because Topia understands the software components specific to the environment, it has the capability to derive risk assessments for each CVE.

01

Dissect Software Components

Topia associates the libraries, executables, and resources with each application.

02

Collect Contextual Data

Internal and external data feeds are gathered to contextualize the asset—who is using it, on which asset, and how?

03

Construct Risk Profile

A risk score is calculated based on the unique exploitation properties Topia found.

last_chanse_02.png

Start Closing Security Gaps

  • Risk reduction from Day 1
  • Fast set-up and deployment
  • Unified platform
  • Full-featured 30-day trial
    CVE Invaders
    cta_cve_06_28px.gif