{"id":3308,"date":"2021-06-18T07:23:17","date_gmt":"2021-06-18T07:23:17","guid":{"rendered":"https:\/\/cyberwatch.fr\/vulnerability-manager-features\/"},"modified":"2025-12-09T10:41:47","modified_gmt":"2025-12-09T10:41:47","slug":"vulnerability-manager-features","status":"publish","type":"page","link":"https:\/\/cyberwatch.fr\/en\/vulnerability-manager-features\/","title":{"rendered":"Vulnerability Manager Features"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Features&#8221; _builder_version=&#8221;4.9.4&#8243; background_enable_color=&#8221;off&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#3c4b64&#8243; background_color_gradient_end=&#8221;#3c4b64&#8243; background_color_gradient_type=&#8221;radial&#8221; background_color_gradient_start_position=&#8221;27%&#8221; background_image=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/06\/Header_VM-3.png&#8221; background_blend=&#8221;overlay&#8221; custom_padding=&#8221;40px|0px|40px|0px||&#8221;][et_pb_row _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||||false|false&#8221; global_module=&#8221;2861&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][lwp_divi_breadcrumbs home_text=&#8221;Home&#8221; font_icon=&#8221;%%20%%&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][\/lwp_divi_breadcrumbs][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;0px||0px||false|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|600||on|||||&#8221; text_text_color=&#8221;#ffffff&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1em&#8221; header_font=&#8221;Poppins||||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;35px&#8221; header_line_height=&#8221;1.2em&#8221; text_orientation=&#8221;center&#8221; width=&#8221;74%&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||20px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221;]<\/p>\n<p>Cyberwatch Vulnerability Manager<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;2em&#8221; header_font=&#8221;Poppins||||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#ffffff&#8221; header_font_size=&#8221;35px&#8221; header_line_height=&#8221;1.2em&#8221; header_2_text_color=&#8221;#000000&#8243; width=&#8221;74%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|phone&#8221; max_width_tablet=&#8221;&#8221; max_width_phone=&#8221;150%&#8221; max_width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;5px||||false|false&#8221; hover_enabled=&#8221;0&#8243; header_font_size_tablet=&#8221;&#8221; header_font_size_phone=&#8221;25px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h1>Discover the features of our platform to monitor your vulnerabilities<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Produits&#8221; _builder_version=&#8221;4.9.4&#8243; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;1px||40px|||&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;30px||30px||true|false&#8221; background_last_edited=&#8221;on|phone&#8221; background_enable_color_phone=&#8221;off&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Right Sided Image&#8221; _builder_version=&#8221;4.9.4&#8243; custom_padding=&#8221;40px|0px|40px|0px|true|false&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;0px|0px|30px|0px|false|false&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins||||||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Poppins|600||on|||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;16px&#8221; header_2_line_height=&#8221;1.3em&#8221; header_3_text_align=&#8221;left&#8221; header_3_font_size=&#8221;27px&#8221; header_3_line_height=&#8221;1.4em&#8221; max_width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; hover_enabled=&#8221;0&#8243; text_text_color_tablet=&#8221;&#8221; text_text_color_phone=&#8221;#ffffff&#8221; text_text_color_last_edited=&#8221;on|phone&#8221; header_2_text_align_tablet=&#8221;center&#8221; header_2_text_align_phone=&#8221;center&#8221; header_2_text_align_last_edited=&#8221;on|phone&#8221; header_2_text_color_tablet=&#8221;&#8221; header_2_text_color_phone=&#8221;#000000&#8243; header_2_text_color_last_edited=&#8221;on|phone&#8221; header_3_text_align_tablet=&#8221;center&#8221; header_3_text_align_phone=&#8221;center&#8221; header_3_text_align_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;&#8221; header_3_font_size_phone=&#8221;22px&#8221; header_3_font_size_last_edited=&#8221;on|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2>Mapping<\/h2>\n<h3>Get complete and continuous visibility of your assets<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins||||||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Poppins|600||on|||||&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;16px&#8221; header_2_line_height=&#8221;1.3em&#8221; header_3_line_height=&#8221;1.4em&#8221; max_width=&#8221;700px&#8221; module_alignment=&#8221;center&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;|0px||0px|false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; hover_enabled=&#8221;0&#8243; text_text_color_tablet=&#8221;&#8221; text_text_color_phone=&#8221;#3C4B64&#8243; text_text_color_last_edited=&#8221;on|phone&#8221; header_2_text_color_tablet=&#8221;&#8221; header_2_text_color_phone=&#8221;#000000&#8243; header_2_text_color_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Identify the elements present in your information system with our asset discovery engine.<\/p>\n<p>Regularly scan your network for Shadow IT and look for new domain names in your possession.<\/p>\n<p>You can also interface our platform with your infrastructure management tools (CMDB, LDAP, Active Directory, OpenStack, VMWare, vSphere, Amazon Web Services, Microsoft Azure, Google Cloud Platform&#8230;), to cover your entire exposure area.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiJ9fQ==@&#8221; button_text=&#8221;Get a free demo&#8221; button_alignment=&#8221;left&#8221; button_alignment_tablet=&#8221;center&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.9.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#321fdb&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;RGBA(0,0,0,0)&#8221; button_border_radius=&#8221;10px&#8221; button_font=&#8221;Poppins||||||||&#8221; button_icon=&#8221;%%3%%&#8221; button_icon_color=&#8221;#ffffff&#8221; button_on_hover=&#8221;off&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;10px|35px|10px|15px|false|false&#8221; global_module=&#8221;2108&#8243; saved_tabs=&#8221;all&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#301abf&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/cyberwatch-fr-fonctionnalites-commun-cartographie.gif&#8221; alt=&#8221;Identify what&#8217;s in your information system with Cyberwatch&#8217;s asset discovery engine&#8221; title_text=&#8221;Asset Mapping&#8221; show_in_lightbox=&#8221;on&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;40px||||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;||||false|false&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||true|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_divider color=&#8221;#CED2D8&#8243; divider_position=&#8221;center&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;2px|||||&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Right Sided Image&#8221; _builder_version=&#8221;4.9.4&#8243; custom_padding=&#8221;40px|0px|40px|0px|true|false&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;30px|0px|30px|0px|true|false&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins||||||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Poppins|600||on|||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;16px&#8221; header_2_line_height=&#8221;1.3em&#8221; header_3_text_align=&#8221;left&#8221; header_3_font_size=&#8221;27px&#8221; header_3_line_height=&#8221;1.4em&#8221; max_width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; hover_enabled=&#8221;0&#8243; text_text_color_tablet=&#8221;&#8221; text_text_color_phone=&#8221;#ffffff&#8221; text_text_color_last_edited=&#8221;on|phone&#8221; header_2_text_align_tablet=&#8221;center&#8221; header_2_text_align_phone=&#8221;center&#8221; header_2_text_align_last_edited=&#8221;on|phone&#8221; header_2_text_color_tablet=&#8221;&#8221; header_2_text_color_phone=&#8221;#000000&#8243; header_2_text_color_last_edited=&#8221;on|phone&#8221; header_3_text_align_tablet=&#8221;center&#8221; header_3_text_align_phone=&#8221;center&#8221; header_3_text_align_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;&#8221; header_3_font_size_phone=&#8221;22px&#8221; header_3_font_size_last_edited=&#8221;on|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2>Detection<\/h2>\n<h3>Scan your vulnerabilities, with or without an agent<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins||||||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Poppins|600||on|||||&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;16px&#8221; header_2_line_height=&#8221;1.3em&#8221; header_3_line_height=&#8221;1.4em&#8221; max_width=&#8221;700px&#8221; module_alignment=&#8221;center&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;|0px||0px|false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; hover_enabled=&#8221;0&#8243; text_text_color_tablet=&#8221;&#8221; text_text_color_phone=&#8221;#3C4B64&#8243; text_text_color_last_edited=&#8221;on|phone&#8221; header_2_text_color_tablet=&#8221;&#8221; header_2_text_color_phone=&#8221;#000000&#8243; header_2_text_color_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Search for vulnerabilities in your assets using our proprietary scanning engine, which can identify vulnerabilities in over 70,000 technologies.<\/p>\n<p>Run your scans with or without an agent, on your servers, workstations, Docker images, network devices or even your websites.<\/p>\n<p>For the most sensitive assets, use our &#8220;air gap \/ disconnected&#8221; scanning mode, from data coming from a CMDB, an asset management tool (Tranquil-IT WAPT, Teclib&#8217; GLPI, Microsoft SCCM&#8230;) or a USB key.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiJ9fQ==@&#8221; button_text=&#8221;Get a free demo&#8221; button_alignment=&#8221;left&#8221; button_alignment_tablet=&#8221;center&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.9.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#321fdb&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;RGBA(0,0,0,0)&#8221; button_border_radius=&#8221;10px&#8221; button_font=&#8221;Poppins||||||||&#8221; button_icon=&#8221;%%3%%&#8221; button_icon_color=&#8221;#ffffff&#8221; button_on_hover=&#8221;off&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;10px|35px|10px|15px|false|false&#8221; global_module=&#8221;2108&#8243; saved_tabs=&#8221;all&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#301abf&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/cyberwatch-fr-fonctionnalites-vm-detection.gif&#8221; alt=&#8221;Search for vulnerabilities in your assets using our proprietary scanning engine, which can identify vulnerabilities in over 70,000 technologies.&#8221; title_text=&#8221;Cyberwatch Vulnerability Manager detection features&#8221; show_in_lightbox=&#8221;on&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;40px||||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;||||false|false&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||true|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_divider color=&#8221;#CED2D8&#8243; divider_position=&#8221;center&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;2px|||||&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Right Sided Image&#8221; _builder_version=&#8221;4.9.4&#8243; custom_padding=&#8221;40px|0px|40px|0px|true|false&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;30px|0px|30px|0px|true|false&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins||||||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Poppins|600||on|||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;16px&#8221; header_2_line_height=&#8221;1.3em&#8221; header_3_text_align=&#8221;left&#8221; header_3_font_size=&#8221;27px&#8221; header_3_line_height=&#8221;1.4em&#8221; max_width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; hover_enabled=&#8221;0&#8243; text_text_color_tablet=&#8221;&#8221; text_text_color_phone=&#8221;#ffffff&#8221; text_text_color_last_edited=&#8221;on|phone&#8221; header_2_text_align_tablet=&#8221;center&#8221; header_2_text_align_phone=&#8221;center&#8221; header_2_text_align_last_edited=&#8221;on|phone&#8221; header_2_text_color_tablet=&#8221;&#8221; header_2_text_color_phone=&#8221;#000000&#8243; header_2_text_color_last_edited=&#8221;on|phone&#8221; header_3_text_align_tablet=&#8221;center&#8221; header_3_text_align_phone=&#8221;center&#8221; header_3_text_align_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;&#8221; header_3_font_size_phone=&#8221;22px&#8221; header_3_font_size_last_edited=&#8221;on|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2>Identification<\/h2>\n<h3>Identify the most important assets, according to your business challenges<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins||||||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Poppins|600||on|||||&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;16px&#8221; header_2_line_height=&#8221;1.3em&#8221; header_3_line_height=&#8221;1.4em&#8221; max_width=&#8221;700px&#8221; module_alignment=&#8221;center&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;|0px||0px|false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; hover_enabled=&#8221;0&#8243; text_text_color_tablet=&#8221;&#8221; text_text_color_phone=&#8221;#3C4B64&#8243; text_text_color_last_edited=&#8221;on|phone&#8221; header_2_text_color_tablet=&#8221;&#8221; header_2_text_color_phone=&#8221;#000000&#8243; header_2_text_color_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Define your availability, integrity, and confidentiality goals, and create prioritization strategies that fit your needs.<\/p>\n<p>Choose a vulnerability threshold, for each asset scanned. Finally, define groups to describe the environment of each asset, and provide your users with restricted access to a specific area within our platform.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiJ9fQ==@&#8221; button_text=&#8221;Get a free demo&#8221; button_alignment=&#8221;left&#8221; button_alignment_tablet=&#8221;center&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.9.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#321fdb&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;RGBA(0,0,0,0)&#8221; button_border_radius=&#8221;10px&#8221; button_font=&#8221;Poppins||||||||&#8221; button_icon=&#8221;%%3%%&#8221; button_icon_color=&#8221;#ffffff&#8221; button_on_hover=&#8221;off&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;10px|35px|10px|15px|false|false&#8221; global_module=&#8221;2108&#8243; saved_tabs=&#8221;all&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#301abf&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/cyberwatch-fr-fonctionnalites-vm-identification.gif&#8221; alt=&#8221;Define your availability, integrity, and confidentiality goals, and create prioritization strategies that fit your needs.&#8221; title_text=&#8221;Cyberwatch Vulnerability Manager identification features&#8221; show_in_lightbox=&#8221;on&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;40px||||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||true|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_divider color=&#8221;#CED2D8&#8243; divider_position=&#8221;center&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;2px|||||&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Right Sided Image&#8221; _builder_version=&#8221;4.9.4&#8243; custom_padding=&#8221;40px|0px|40px|0px|true|false&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;30px|0px|30px|0px|true|false&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins||||||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Poppins|600||on|||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;16px&#8221; header_2_line_height=&#8221;1.3em&#8221; header_3_text_align=&#8221;left&#8221; header_3_font_size=&#8221;27px&#8221; header_3_line_height=&#8221;1.4em&#8221; max_width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; hover_enabled=&#8221;0&#8243; text_text_color_tablet=&#8221;&#8221; text_text_color_phone=&#8221;#ffffff&#8221; text_text_color_last_edited=&#8221;on|phone&#8221; header_2_text_align_tablet=&#8221;center&#8221; header_2_text_align_phone=&#8221;center&#8221; header_2_text_align_last_edited=&#8221;on|phone&#8221; header_2_text_color_tablet=&#8221;&#8221; header_2_text_color_phone=&#8221;#000000&#8243; header_2_text_color_last_edited=&#8221;on|phone&#8221; header_3_text_align_tablet=&#8221;center&#8221; header_3_text_align_phone=&#8221;center&#8221; header_3_text_align_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;&#8221; header_3_font_size_phone=&#8221;22px&#8221; header_3_font_size_last_edited=&#8221;on|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2>Prioritization<\/h2>\n<h3>Highlight the vulnerabilities that really matter<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins||||||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Poppins|600||on|||||&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;16px&#8221; header_2_line_height=&#8221;1.3em&#8221; header_3_line_height=&#8221;1.4em&#8221; max_width=&#8221;700px&#8221; module_alignment=&#8221;center&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;|0px||0px|false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; hover_enabled=&#8221;0&#8243; text_text_color_tablet=&#8221;&#8221; text_text_color_phone=&#8221;#3C4B64&#8243; text_text_color_last_edited=&#8221;on|phone&#8221; header_2_text_color_tablet=&#8221;&#8221; header_2_text_color_phone=&#8221;#000000&#8243; header_2_text_color_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Our platform automatically calculates the real danger of each vulnerability for each of your assets, using the Cyberscore.<\/p>\n<p>The Cyberscore is a method developed on the basis of the environmental and temporal criteria of the CVSS v3.1. It aggregates data from Cyberwatch&#8217;s monitoring of available public exploits and attack kits. It also includes data from your configured business goals and thresholds.<\/p>\n<p>This way, you can easily see the priority vulnerabilities in your information system.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiJ9fQ==@&#8221; button_text=&#8221;Get a free demo&#8221; button_alignment=&#8221;left&#8221; button_alignment_tablet=&#8221;center&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.9.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#321fdb&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;RGBA(0,0,0,0)&#8221; button_border_radius=&#8221;10px&#8221; button_font=&#8221;Poppins||||||||&#8221; button_icon=&#8221;%%3%%&#8221; button_icon_color=&#8221;#ffffff&#8221; button_on_hover=&#8221;off&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;10px|35px|10px|15px|false|false&#8221; global_module=&#8221;2108&#8243; saved_tabs=&#8221;all&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#301abf&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/cyberwatch-fr-fonctionnalites-vm-priorisation.gif&#8221; alt=&#8221;Our platform automatically calculates the real danger of each vulnerability for each of your assets, using the Cyberscore.&#8221; title_text=&#8221;Cyberwatch Vulnerability Manager prioritization feature&#8221; show_in_lightbox=&#8221;on&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;40px||||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||true|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_divider color=&#8221;#CED2D8&#8243; divider_position=&#8221;center&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;2px|||||&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Right Sided Image&#8221; _builder_version=&#8221;4.9.4&#8243; custom_padding=&#8221;40px|0px|40px|0px|true|false&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;30px|0px|30px|0px|true|false&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins||||||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Poppins|600||on|||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;16px&#8221; header_2_line_height=&#8221;1.3em&#8221; header_3_text_align=&#8221;left&#8221; header_3_font_size=&#8221;27px&#8221; header_3_line_height=&#8221;1.4em&#8221; max_width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; hover_enabled=&#8221;0&#8243; text_text_color_tablet=&#8221;&#8221; text_text_color_phone=&#8221;#ffffff&#8221; text_text_color_last_edited=&#8221;on|phone&#8221; header_2_text_align_tablet=&#8221;center&#8221; header_2_text_align_phone=&#8221;center&#8221; header_2_text_align_last_edited=&#8221;on|phone&#8221; header_2_text_color_tablet=&#8221;&#8221; header_2_text_color_phone=&#8221;#000000&#8243; header_2_text_color_last_edited=&#8221;on|phone&#8221; header_3_text_align_tablet=&#8221;center&#8221; header_3_text_align_phone=&#8221;center&#8221; header_3_text_align_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;&#8221; header_3_font_size_phone=&#8221;22px&#8221; header_3_font_size_last_edited=&#8221;on|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2>DECISION SUPPORT<\/h2>\n<h3>Make the right decisions, and keep track of your actions<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins||||||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Poppins|600||on|||||&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;16px&#8221; header_2_line_height=&#8221;1.3em&#8221; header_3_line_height=&#8221;1.4em&#8221; max_width=&#8221;700px&#8221; module_alignment=&#8221;center&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;|0px||0px|false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; hover_enabled=&#8221;0&#8243; text_text_color_tablet=&#8221;&#8221; text_text_color_phone=&#8221;#3C4B64&#8243; text_text_color_last_edited=&#8221;on|phone&#8221; header_2_text_color_tablet=&#8221;&#8221; header_2_text_color_phone=&#8221;#000000&#8243; header_2_text_color_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Generate relevant and customizable dashboards to help you make the most appropriate decisions to achieve your goals.<\/p>\n<p>Monitor your vulnerabilities by asset or by outcome, and measure your remediation times.<\/p>\n<p>Send requests to third party systems (ticketing tool, CMDB, email&#8230;) and add comments on vulnerabilities.<\/p>\n<p>Identify vulnerabilities that you can&#8217;t address for production reasons, and mark them as accepted risks so you can focus on the things you can fix.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiJ9fQ==@&#8221; button_text=&#8221;Get a free demo&#8221; button_alignment=&#8221;left&#8221; button_alignment_tablet=&#8221;center&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.9.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#321fdb&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;RGBA(0,0,0,0)&#8221; button_border_radius=&#8221;10px&#8221; button_font=&#8221;Poppins||||||||&#8221; button_icon=&#8221;%%3%%&#8221; button_icon_color=&#8221;#ffffff&#8221; button_on_hover=&#8221;off&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;10px|35px|10px|15px|false|false&#8221; global_module=&#8221;2108&#8243; saved_tabs=&#8221;all&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#301abf&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/cyberwatch-fr-fonctionnalites-vm-aidealadecision-1.gif&#8221; alt=&#8221;Generate relevant and customizable dashboards to help you make the most appropriate decisions to achieve your goals.&#8221; title_text=&#8221;Cyberwatch Vulnerability Manager&#8217;s decision support features&#8221; show_in_lightbox=&#8221;on&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;40px||||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||true|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_divider color=&#8221;#CED2D8&#8243; divider_position=&#8221;center&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;2px|||||&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Right Sided Image&#8221; _builder_version=&#8221;4.9.4&#8243; custom_padding=&#8221;40px|0px|0px|0px|false|false&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;30px|0px|0px|0px|false|false&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins||||||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Poppins|600||on|||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;16px&#8221; header_2_line_height=&#8221;1.3em&#8221; header_3_text_align=&#8221;left&#8221; header_3_font_size=&#8221;27px&#8221; header_3_line_height=&#8221;1.4em&#8221; max_width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; hover_enabled=&#8221;0&#8243; text_text_color_tablet=&#8221;&#8221; text_text_color_phone=&#8221;#ffffff&#8221; text_text_color_last_edited=&#8221;on|phone&#8221; header_2_text_align_tablet=&#8221;center&#8221; header_2_text_align_phone=&#8221;center&#8221; header_2_text_align_last_edited=&#8221;on|phone&#8221; header_2_text_color_tablet=&#8221;&#8221; header_2_text_color_phone=&#8221;#000000&#8243; header_2_text_color_last_edited=&#8221;on|phone&#8221; header_3_text_align_tablet=&#8221;center&#8221; header_3_text_align_phone=&#8221;center&#8221; header_3_text_align_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;&#8221; header_3_font_size_phone=&#8221;22px&#8221; header_3_font_size_last_edited=&#8221;on|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2>Correction<\/h2>\n<h3>Deploy the appropriate patches and neutralize your vulnerabilities<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins||||||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Poppins|600||on|||||&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;16px&#8221; header_2_line_height=&#8221;1.3em&#8221; header_3_line_height=&#8221;1.4em&#8221; max_width=&#8221;700px&#8221; module_alignment=&#8221;center&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;|0px||0px|false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; hover_enabled=&#8221;0&#8243; text_text_color_tablet=&#8221;&#8221; text_text_color_phone=&#8221;#3C4B64&#8243; text_text_color_last_edited=&#8221;on|phone&#8221; header_2_text_color_tablet=&#8221;&#8221; header_2_text_color_phone=&#8221;#000000&#8243; header_2_text_color_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Instruct our platform to install security patches from vendors to address your vulnerabilities, with or without an agent, via our native Patch Management module.<\/p>\n<p>Deploy security updates on Linux and Microsoft Windows systems, according to your configurations. Our platform automatically recognizes the presence of a WSUS and your package repositories. It uses these items as sources for your updates.<\/p>\n<p>Connect Cyberwatch to your existing software to patch vulnerabilities via your production tools.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiJ9fQ==@&#8221; button_text=&#8221;Get a free demo&#8221; button_alignment=&#8221;left&#8221; button_alignment_tablet=&#8221;center&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.9.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#321fdb&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;RGBA(0,0,0,0)&#8221; button_border_radius=&#8221;10px&#8221; button_font=&#8221;Poppins||||||||&#8221; button_icon=&#8221;%%3%%&#8221; button_icon_color=&#8221;#ffffff&#8221; button_on_hover=&#8221;off&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;10px|35px|10px|15px|false|false&#8221; global_module=&#8221;2108&#8243; saved_tabs=&#8221;all&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#301abf&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/cyberwatch-fr-fonctionnalites-vm-correction.gif&#8221; alt=&#8221;Instruct our platform to install security patches from vendors to address your vulnerabilities, with or without an agent, via our native Patch Management module.&#8221; title_text=&#8221;Cyberwatch Vulnerability Manager patching features&#8221; show_in_lightbox=&#8221;on&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;40px||||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Features&#8221; _builder_version=&#8221;4.9.4&#8243; background_color=&#8221;#321FDB&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#000000&#8243; background_color_gradient_end=&#8221;#3c4b64&#8243; background_color_gradient_direction=&#8221;1deg&#8221; background_color_gradient_end_position=&#8221;0%&#8221; background_image=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/coding-background-texture.jpg&#8221; background_blend=&#8221;overlay&#8221; custom_padding=&#8221;40px|0px|40px|0px|true|&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;30px||30px||true|false&#8221;][et_pb_row admin_label=&#8221;Title Area&#8221; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;2px||23px|||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Title&#8221; _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#ffffff&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Poppins||||||||&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;28px&#8221; header_2_line_height=&#8221;1.4em&#8221; text_orientation=&#8221;center&#8221; max_width=&#8221;78%&#8221; max_width_tablet=&#8221;100%&#8221; max_width_phone=&#8221;100%&#8221; max_width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||10px|&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;0px|0px|0px|0px|true|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; animation_direction=&#8221;top&#8221; hover_enabled=&#8221;0&#8243; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;22px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2>Complete your risk analysis with our vulnerability encyclopedia<\/h2>\n<p>Check out the <a href=\"https:\/\/cyberwatch.fr\/en\/encyclopedia\/\">knowledge base<\/a> embedded in our platform for additional information on vulnerabilities, with clickable links to public attack kits, vendor alerts, and government advisories.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; admin_label=&#8221;Services Area&#8221; _builder_version=&#8221;4.9.4&#8243; min_height=&#8221;92.7px&#8221; custom_padding=&#8221;2px||1px|||&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/book.png&#8221; alt=&#8221;Vulnerability knowledge base embedded in the Cyberwatch platform&#8221; title_text=&#8221;Vulnerability Encyclopedia&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.9.4&#8243; max_width=&#8221;50px&#8221; custom_margin=&#8221;||0px||false|false&#8221; filter_invert=&#8221;100%&#8221;][\/et_pb_image][et_pb_cta title=&#8221;Knowledge base on vulnerabilities, embedded in our platform&#8221; button_url=&#8221;#&#8221; admin_label=&#8221;Service&#8221; _builder_version=&#8221;4.9.4&#8243; header_level=&#8221;h3&#8243; header_font=&#8221;Poppins||||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Poppins|300|||||||&#8221; body_text_align=&#8221;center&#8221; body_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; use_background_color=&#8221;off&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#8b20bb&#8221; button_bg_color=&#8221;rgba(0,0,0,0)&#8221; button_border_width=&#8221;0px&#8221; button_letter_spacing=&#8221;2px&#8221; button_font=&#8221;Poppins|600||on|||||&#8221; button_icon=&#8221;%%3%%&#8221; button_alignment=&#8221;left&#8221; text_orientation=&#8221;left&#8221; custom_margin=&#8221;15px||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; text_orientation_tablet=&#8221;&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;]<\/p>\n<p>Scan with all available vulnerability information in one place.<\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/bug-2.png&#8221; alt=&#8221;Instantly identify assets impacted by a vulnerability&#8221; title_text=&#8221;Assets impacted by a vulnerability&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.9.4&#8243; max_width=&#8221;55px&#8221; custom_margin=&#8221;||0px||false|false&#8221; filter_invert=&#8221;100%&#8221; locked=&#8221;off&#8221;][\/et_pb_image][et_pb_cta title=&#8221;Instantly identify assets impacted by a vulnerability&#8221; button_url=&#8221;#&#8221; admin_label=&#8221;Service&#8221; _builder_version=&#8221;4.9.4&#8243; header_level=&#8221;h3&#8243; header_font=&#8221;Poppins|500|||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Poppins|300|||||||&#8221; body_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; use_background_color=&#8221;off&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#8b20bb&#8221; button_bg_color=&#8221;rgba(0,0,0,0)&#8221; button_border_width=&#8221;0px&#8221; button_letter_spacing=&#8221;2px&#8221; button_font=&#8221;Poppins|600||on|||||&#8221; button_icon=&#8221;%%3%%&#8221; button_alignment=&#8221;left&#8221; custom_margin=&#8221;15px||||false|false&#8221; custom_padding=&#8221;|||&#8221; text_orientation_tablet=&#8221;&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;]<\/p>\n<p>Search for the vulnerabilities you are interested in in our encyclopedia, and immediately get the list of impacted assets.<\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/backup.png&#8221; alt=&#8221;Get up-to-date information on vulnerabilities&#8221; title_text=&#8221;Data updated every hour&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.9.4&#8243; max_width=&#8221;50px&#8221; custom_margin=&#8221;||0px||false|false&#8221; filter_invert=&#8221;100%&#8221; locked=&#8221;off&#8221;][\/et_pb_image][et_pb_cta title=&#8221;Data updated every hour&#8221; button_url=&#8221;#&#8221; admin_label=&#8221;Service&#8221; _builder_version=&#8221;4.9.4&#8243; header_level=&#8221;h3&#8243; header_font=&#8221;Poppins|500|||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Poppins|300|||||||&#8221; body_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;16px&#8221; body_line_height=&#8221;1.8em&#8221; use_background_color=&#8221;off&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#8b20bb&#8221; button_bg_color=&#8221;rgba(0,0,0,0)&#8221; button_border_width=&#8221;0px&#8221; button_letter_spacing=&#8221;2px&#8221; button_font=&#8221;Poppins|600||on|||||&#8221; button_icon=&#8221;%%3%%&#8221; button_alignment=&#8221;left&#8221; custom_margin=&#8221;15px||||false|false&#8221; custom_padding=&#8221;||0px|||&#8221; text_orientation_tablet=&#8221;&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;]<\/p>\n<p>Get up-to-date vulnerability information, updated hourly with the latest information from vendors and authorities.<\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||2px|||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc2NyJ9fQ==@&#8221; button_text=&#8221;Learn more about the encyclopedia&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.9.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;RGBA(0,0,0,0)&#8221; button_border_radius=&#8221;10px&#8221; button_icon=&#8221;%%3%%&#8221; button_icon_color=&#8221;#FFFFFF&#8221; button_on_hover=&#8221;off&#8221; custom_padding=&#8221;10px|40px|10px|20px|false|false&#8221; global_module=&#8221;2833&#8243; saved_tabs=&#8221;all&#8221; button_text_color__hover_enabled=&#8221;on|desktop&#8221; button_text_color__hover=&#8221;#000000&#8243; button_border_width__hover_enabled=&#8221;on|hover&#8221; button_border_width__hover=&#8221;0px&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#ffffff&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/Formulaire_Blanc-1.png&#8221; custom_padding=&#8221;40px||40px||true|&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;30px||30px||true|false&#8221; global_module=&#8221;2139&#8243;][et_pb_row _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;1px||1px|||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins|||on|||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.7em&#8221; header_2_font=&#8221;Poppins|500|||||||&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;27px&#8221; header_2_line_height=&#8221;1.3em&#8221; header_3_font=&#8221;||||||||&#8221; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#000000&#8243; header_3_font_size=&#8221;27px&#8221; header_3_line_height=&#8221;1.4em&#8221; text_orientation=&#8221;center&#8221; max_width=&#8221;700px&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;||||false|false&#8221; text_text_color_tablet=&#8221;&#8221; text_text_color_phone=&#8221;#3C4B64&#8243; text_text_color_last_edited=&#8221;on|phone&#8221; header_2_text_color_tablet=&#8221;&#8221; header_2_text_color_phone=&#8221;#000000&#8243; header_2_text_color_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;22px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221;]<\/p>\n<h2>Do you have a question?<br \/>Do you want to schedule a free demo?<\/h2>\n<p>Contact-us and our experts will get back to you within 24h.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiJ9fQ==@&#8221; button_text=&#8221;Get a free demo&#8221; button_alignment=&#8221;center&#8221; button_alignment_tablet=&#8221;&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.9.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#321fdb&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;RGBA(0,0,0,0)&#8221; button_border_radius=&#8221;10px&#8221; button_font=&#8221;Poppins||||||||&#8221; button_icon=&#8221;%%3%%&#8221; button_icon_color=&#8221;#ffffff&#8221; button_on_hover=&#8221;off&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;10px|35px|10px|15px|false|false&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#301abf&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p><div class=\"et_pb_module lwp_divi_breadcrumbs lwp_divi_breadcrumbs_0\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"et_pb_module_inner\">\n\t\t\t\t\t<div class=\"lwp-breadcrumbs\"> <span class=\"before\"><\/span> <span vocab=\"https:\/\/schema.org\/\" typeof=\"BreadcrumbList\"><span property=\"itemListElement\" typeof=\"ListItem\"><a property=\"item\" typeof=\"WebPage\" href=\"https:\/\/cyberwatch.fr\/en\/\" class=\"home\"><span property=\"name\">Home<\/span><\/a><meta property=\"position\" content=\"1\"><\/span> <span class=\"separator et-pb-icon\">5<\/span> <\/span><\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>Cyberwatch Vulnerability ManagerDiscover the features of our platform to monitor your vulnerabilitiesMapping Get complete and continuous visibility of your assetsIdentify the elements present in your information system with our asset discovery engine. Regularly scan your network for Shadow IT and look for new domain names in your possession. You can also [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6897,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-3308","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Learn more about the features of Cyberwatch Vulnerability Manager<\/title>\n<meta name=\"description\" content=\"With Cyberwatch Vulnerability Manager, you can efficiently manage your vulnerabilities: from detection to prioritization to remediation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberwatch.fr\/en\/vulnerability-manager-features\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Learn more about the features of Cyberwatch Vulnerability Manager\" \/>\n<meta property=\"og:description\" content=\"Cyberwatch Vulnerability Manager helps you manage your vulnerabilities, with detection, prioritization, and remediation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberwatch.fr\/en\/vulnerability-manager-features\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberwatch\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-09T10:41:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/06\/metas-site.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Learn more about the features of Cyberwatch Vulnerability Manager\" \/>\n<meta name=\"twitter:description\" content=\"Cyberwatch Vulnerability Manager helps you manage your vulnerabilities, with detection, prioritization, and remediation.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/06\/metas-site.png\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/vulnerability-manager-features\\\/\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/vulnerability-manager-features\\\/\",\"name\":\"Learn more about the features of Cyberwatch Vulnerability Manager\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/vulnerability-manager-features\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/vulnerability-manager-features\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/meta-cyberwatch.png\",\"datePublished\":\"2021-06-18T07:23:17+00:00\",\"dateModified\":\"2025-12-09T10:41:47+00:00\",\"description\":\"With Cyberwatch Vulnerability Manager, you can efficiently manage your vulnerabilities: from detection to prioritization to remediation.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/vulnerability-manager-features\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/vulnerability-manager-features\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/vulnerability-manager-features\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/meta-cyberwatch.png\",\"contentUrl\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/meta-cyberwatch.png\",\"width\":1200,\"height\":628,\"caption\":\"Logo cyberwatch\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/vulnerability-manager-features\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Manager Features\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/\",\"name\":\"Cyberwatch\",\"description\":\"Supervisez vos vuln\u00e9rabilit\u00e9s. Contr\u00f4lez vos conformit\u00e9s.\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#organization\",\"name\":\"Cyberwatch\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo_simple_black.png\",\"contentUrl\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo_simple_black.png\",\"width\":1883,\"height\":500,\"caption\":\"Cyberwatch\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Learn more about the features of Cyberwatch Vulnerability Manager","description":"With Cyberwatch Vulnerability Manager, you can efficiently manage your vulnerabilities: from detection to prioritization to remediation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberwatch.fr\/en\/vulnerability-manager-features\/","og_locale":"en_US","og_type":"article","og_title":"Learn more about the features of Cyberwatch Vulnerability Manager","og_description":"Cyberwatch Vulnerability Manager helps you manage your vulnerabilities, with detection, prioritization, and remediation.","og_url":"https:\/\/cyberwatch.fr\/en\/vulnerability-manager-features\/","og_site_name":"Cyberwatch","article_modified_time":"2025-12-09T10:41:47+00:00","og_image":[{"url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/06\/metas-site.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_title":"Learn more about the features of Cyberwatch Vulnerability Manager","twitter_description":"Cyberwatch Vulnerability Manager helps you manage your vulnerabilities, with detection, prioritization, and remediation.","twitter_image":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/06\/metas-site.png","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberwatch.fr\/en\/vulnerability-manager-features\/","url":"https:\/\/cyberwatch.fr\/en\/vulnerability-manager-features\/","name":"Learn more about the features of Cyberwatch Vulnerability Manager","isPartOf":{"@id":"https:\/\/cyberwatch.fr\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberwatch.fr\/en\/vulnerability-manager-features\/#primaryimage"},"image":{"@id":"https:\/\/cyberwatch.fr\/en\/vulnerability-manager-features\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch.png","datePublished":"2021-06-18T07:23:17+00:00","dateModified":"2025-12-09T10:41:47+00:00","description":"With Cyberwatch Vulnerability Manager, you can efficiently manage your vulnerabilities: from detection to prioritization to remediation.","breadcrumb":{"@id":"https:\/\/cyberwatch.fr\/en\/vulnerability-manager-features\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberwatch.fr\/en\/vulnerability-manager-features\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberwatch.fr\/en\/vulnerability-manager-features\/#primaryimage","url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch.png","contentUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch.png","width":1200,"height":628,"caption":"Logo cyberwatch"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberwatch.fr\/en\/vulnerability-manager-features\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberwatch.fr\/en\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Manager Features"}]},{"@type":"WebSite","@id":"https:\/\/cyberwatch.fr\/en\/#website","url":"https:\/\/cyberwatch.fr\/en\/","name":"Cyberwatch","description":"Supervisez vos vuln\u00e9rabilit\u00e9s. Contr\u00f4lez vos conformit\u00e9s.","publisher":{"@id":"https:\/\/cyberwatch.fr\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberwatch.fr\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberwatch.fr\/en\/#organization","name":"Cyberwatch","url":"https:\/\/cyberwatch.fr\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberwatch.fr\/en\/#\/schema\/logo\/image\/","url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/logo_simple_black.png","contentUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/logo_simple_black.png","width":1883,"height":500,"caption":"Cyberwatch"},"image":{"@id":"https:\/\/cyberwatch.fr\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/pages\/3308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/comments?post=3308"}],"version-history":[{"count":12,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/pages\/3308\/revisions"}],"predecessor-version":[{"id":9424,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/pages\/3308\/revisions\/9424"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/media\/6897"}],"wp:attachment":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/media?parent=3308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}