Laserfiche WebLink
<br /> 5 <br />• Summary of incident <br />• Summary of any confirmed actions taken (by CI and/or <br />Customer) <br />• Final status and/or resolution <br /> <br />Monthly Activity Report: <br />• Published by the 15th of month <br />• Security Events Generated <br />• Investigations Completed <br />• Confirmed Severe Incidents (IAPs Issued) <br />• Security events to include: <br />• Intrusion detection signatures <br />• Reputation matches <br />• Anomalous traffic identification <br />• Threat hunting findings <br />• Additional detail for critical assets and highest volume <br />events <br /> <br />Continuous <br />Vulnerability <br />Identification <br />(CI-CVI) <br />• Automatically conducts internal network vulnerability scans at <br />Customer-defined frequencies and IP scopes(s) <br />• Identifies insecure configurations, open ports and services, <br />vulnerable software/service versions, and missing patches <br />• Generates reports with steps to eliminate each vulnerability, as well <br />as risk via CVSS scores to allow prioritization of remediation efforts <br />• Populates a web dashboard to view statistics, visualizations, and <br />results <br />• Tabular Results <br />• Graphical representation of time-based trends for newly <br />identified vulnerabilities and for remediated vulnerabilities <br /> <br />Log Retention <br />(CI-LR) <br />• CI saves logs as indicated by Customer <br />• CI hashes and encrypts logs to enable Customer to verify that they <br />are secure and unchanged <br />• CI will gather and return logs according to search criteria (limited to <br />source and date) specified by Customer, when requested <br /> <br /> <br />