Skip to main content
All CollectionsGetting Started and Core ConceptsGetting Started
Getting Started with Vulcan: Vulnerability Management Life-Cycle
Getting Started with Vulcan: Vulnerability Management Life-Cycle

Learn everything you need to know about vulnerability management through this end-to-end walkthrough of the Vulcan Cyber ExposureOS Platform

Updated over 2 months ago

This step-by-step 101 guide walks through all the settings and configurations needed to effectively manage a vulnerability's end-to-end lifecycle with the Vulcan Platform. It is your reference guide to everything you need to know and apply to utilize the Vulcan Platform and optimize vulnerability remediation from start to finish, focusing on the value and benefit of each step.

The Vulcan Cyber Platform feeds from your existing vulnerability scanning tools and asset inventories through dedicated Connectors. Set up Connectors to ingest data from vulnerability scanners, asset management tools, and external feeds such as threat intelligence. By integrating security tools into the Vulcan Platform, you enable efficient management of vulnerability and cyber risk by consolidating scan data from multiple sources into a single stream and get a centralized vulnerability and asset comprehensive view of security risk posture across all attack surfaces.

By defining Business Groups, you apply your organizational business context to cyber risk management. Business Groups let you prioritize risk based on customizable logical groups like a business unit, network segment, application and/or asset type, compliance requirements, or any other grouping relevant to your environment. This way you can prioritize the remediation efforts and resources on the assets that impact your business the most.

By defining Risk Weights, SPR (Security Posture Rating), and SLA (Service Level Agreement), you achieve effective cyber risk management based on organization-specific context within reasonable timeframes, meeting organizational SLAs. The platform's intelligent vulnerability prioritization technology ensures that risk assessments consider relevant context and business-specific impact, enabling security teams to focus on the most critical risks.

Create users and define to enhance security, streamline collaboration, and monitor auditing accountability, and ensure scalability. By defining distinct user accounts and roles, organizations can ensure that only authorized personnel have access to sensitive data and specific functionalities (such as Business Groups), preventing unauthorized access and potential breaches. Detailed logging and tracking of actions enhance accountability, while scalability accommodates organizational growth and changes in team structure. Overall, user and role management provides a solid foundation for efficient and secure cyber risk management practices.

Vulcan Cyber orchestrates vulnerability management efforts across infrastructure, cloud, and application environments. This makes it easy to identify, analyze, prioritize, and mitigate vulnerabilities across the entire organization. You can integrate your ticketing tool system such as Jira, ServiceNow, and Azure Boards, and open remediation tickets directly through the Vulcan Platform.

You can take immediate action on specific vulnerabilities with a click (manual), or create playbooks to automate tedious but essential vulnerability management activities to reduce overhead accelerate risk mitigation, and significantly lower mean time to resolution (MTTR). Vulcan Cyber streamlines collaboration between security teams and remediation operations stakeholders by associating risk with assets and attack surfaces, and identifying asset owners to assign remediation tasks easily and automatically.

By creating exception requests, you can apply the organization's risk-acceptance policy on vulnerabilities through the Vulcan Platform. You can define user permissions, create custom exception request types, and trigger an approval flow for risk-acceptance compliance. Users can view approved "Ignored" vulnerabilities, set approvers and request expiration dates, and receive email notifications as part of the process. With the ability to access and manage exception requests through a dedicated page, organizations can maintain transparency and detailed auditing of approval flows, ensuring a robust and accountable vulnerability management approach.

Whether you’re reporting to the board, other practitioners, or the compliance team, Vulcan Cyber hands you the dashboards you need to clearly articulate the cyber risk within your organization – so that everybody’s on the same page. Track the progress of cyber risk management campaigns, and see exactly where your organization stands when it comes to meeting SLAs and timelines. The Vulcan Dashboard and Analytics Reports provide a wide spectrum of out-of-the-box reports, as well as customized self-service reports and widgets you can create on your own.

keywords: getting started with vulcan, getting started, gettingstarted, start, where to start from, 101 vulcan, get started

Did this answer your question?