{"id":10098,"date":"2025-10-06T13:42:00","date_gmt":"2025-10-06T13:42:00","guid":{"rendered":"https:\/\/cyberwatch.fr\/?p=10098"},"modified":"2026-04-14T14:13:51","modified_gmt":"2026-04-14T14:13:51","slug":"cyberwatch-15-new-major-version-of-cyberwatch","status":"publish","type":"post","link":"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/","title":{"rendered":"Cyberwatch 15.0: Discover the new major version of Cyberwatch"},"content":{"rendered":"\n<p>Version 15.0 of Cyberwatch has been available since September 29, 2025. This new release brings key enhancements that simplify vulnerability and compliance monitoring while improving the user experience.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Feature highlights<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Track the velocity of your security teams<\/h3>\n\n\n\n<p>A new indicator has been added to asset management: vulnerability processing velocity. You can now track your teams&#8217; response time against your defined objectives and measure the responsiveness of your remediation processes in concrete terms.<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e49300702ee&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e49300702ee\" class=\"wp-block-image aligncenter size-large wp-lightbox-container\"><img decoding=\"async\" width=\"1024\" height=\"413\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/10\/velocity-indicators-1024x413.png\" alt=\"\" class=\"wp-image-10101\" srcset=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/10\/velocity-indicators-980x396.png 980w, https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/10\/velocity-indicators-480x194.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 1 \u2013 Addition of velocity indicators.<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Improved user experience<\/h3>\n\n\n\n<p>Cyberwatch 15.0 brings several changes to streamline navigation:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>It is now possible to focus on a project easily via a dedicated selector.<\/li>\n\n\n\n<li>Selecting a CVE, patch, security flaw, compliance rule, or discovery now opens a side panel with all the detailed information, without losing sight of the main view.<\/li>\n<\/ul>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e4930071fd6&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e4930071fd6\" class=\"wp-block-image aligncenter size-large wp-lightbox-container\"><img decoding=\"async\" width=\"1024\" height=\"522\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/10\/vulnerability-encyclopedia-1024x522.png\" alt=\"\" class=\"wp-image-10105\" srcset=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/10\/vulnerability-encyclopedia-980x500.png 980w, https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/10\/vulnerability-encyclopedia-480x245.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 2 \u2013 User experience improvements.<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Greater flexibility and control in project management<\/h3>\n\n\n\n<p>Project management has evolved with the introduction of project-specific identifiers. This new feature allows limited system administrators to add assets for all scan modes. This gives them greater autonomy while remaining within a controlled framework.<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e49300723dd&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e49300723dd\" class=\"wp-block-image aligncenter size-large wp-lightbox-container\"><img decoding=\"async\" width=\"1024\" height=\"523\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/10\/project-specific-identifiers-1024x523.png\" alt=\"\" class=\"wp-image-10108\" srcset=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/10\/project-specific-identifiers-980x500.png 980w, https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/10\/project-specific-identifiers-480x245.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 3 \u2013 Significant improvements, including the introduction of project-specific IDs.<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Map visualization of assets<\/h3>\n\n\n\n<p>Asset details now include a map of their relationships. This view provides a better understanding of your system environment and its dependencies, facilitating impact analysis in the event of a critical vulnerability.<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e4930073058&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e4930073058\" class=\"wp-block-image aligncenter size-large wp-lightbox-container\"><img decoding=\"async\" width=\"1024\" height=\"522\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/aws-asset-cartography-1024x522.png\" alt=\"\" class=\"wp-image-10025\" srcset=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/aws-asset-cartography-980x500.png 980w, https:\/\/cyberwatch.fr\/wp-content\/uploads\/2026\/04\/aws-asset-cartography-480x245.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 4 \u2013 Addition of a map visualization of an asset and its relationships.<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Native integration with AWS CloudFormation<\/h3>\n\n\n\n<p>Cyberwatch now supports CloudFormation integration. Adding your AWS environments becomes more seamless, and you gain enhanced visibility into all your cloud resources directly within the platform.<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e4930073d1d&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e4930073d1d\" class=\"wp-block-image aligncenter size-large wp-lightbox-container\"><img decoding=\"async\" width=\"1024\" height=\"522\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/10\/integration-with-aws-cloudformation-1024x522.png\" alt=\"\" class=\"wp-image-10111\" srcset=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/10\/integration-with-aws-cloudformation-980x500.png 980w, https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/10\/integration-with-aws-cloudformation-480x245.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 5 \u2013 Support for integration with CloudFormation.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">New features in Cyberwatch 15.0<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">API: generalized access<\/h3>\n\n\n\n<p>All users now have access to the Cyberwatch API, making it easier to integrate the platform with your existing tools.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Network targets and websites: enhanced visibility<\/h3>\n\n\n\n<p>The pages browsed during a scan are now accessible directly in the Web Pages tab of an asset&#8217;s record. This transparency provides a better understanding of the actual coverage of the scans.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Compliance: new repository for EKS<\/h3>\n\n\n\n<p>Cyberwatch now integrates the CIS Amazon Elastic Kubernetes Service (EKS) repository, expanding your compliance control options for managed Kubernetes environments.<\/p>\n\n\n\n<p>Discoveries: expanded scope<\/p>\n\n\n\n<p>Two new discoveries are available:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>AWS Organizations, to identify and track the structure of your cloud accounts.<\/li>\n\n\n\n<li>Microsoft Hyper-V, to automatically detect your virtualized environments.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Identity providers: refined user management<\/h3>\n\n\n\n<p>It is now possible to set a time limit before users from an identity provider are deactivated or deleted, allowing for more flexibility in account management.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Docker images: Podman support<\/h3>\n\n\n\n<p>Cyberwatch supports scanning Podman containers on Linux assets, enhancing the analysis capabilities of your containerized environments.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Kibana: vulnerability prioritization<\/h3>\n\n\n\n<p>A new Kibana dashboard highlights priority vulnerabilities, allowing you to focus your efforts where the impact is most critical.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Scope: enrichment of supported technologies<\/h3>\n\n\n\n<p>Cyberwatch 15.0 expands its coverage with:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Veeam Backup &amp; Replication security alerts.<\/li>\n\n\n\n<li>Debian 13 support.<\/li>\n\n\n\n<li>Erlang OTP support.<\/li>\n\n\n\n<li>Amazon SSM agent support on Windows.<\/li>\n\n\n\n<li>ManageEngine ADSelfService Plus support.<\/li>\n\n\n\n<li>Rocky Linux 10 support.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Explore all the new features in Cyberwatch 15.0<\/h2>\n\n\n\n<p>This version 15.0 of Cyberwatch goes far beyond the new features highlighted here: <a href=\"https:\/\/docs.cyberwatch.com\/help\/en\/general_administration_software\/changelog\/\" target=\"_blank\" rel=\"noreferrer noopener\">see the full changelog<\/a> to discover all the changes. We will be presenting a preview at the Assises de la S\u00e9curit\u00e9 conference: visit stand K13 to talk directly with our experts.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Version 15.0 of Cyberwatch has been available since September 29, 2025. This new release brings key enhancements that simplify vulnerability and compliance monitoring while improving the user experience. Feature highlights Track the velocity of your security teams A new indicator has been added to asset management: vulnerability processing velocity. You can now track your teams&#8217; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":9243,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[29],"tags":[],"class_list":["post-10098","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberwatch 15.0: Discover the new major version of Cyberwatch - Cyberwatch<\/title>\n<meta name=\"description\" content=\"Cyberwatch 15.0: Discover the new features of the Cyberwatch vulnerability management software. Read the article...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberwatch 15.0: Discover the new major version of Cyberwatch - Cyberwatch\" \/>\n<meta property=\"og:description\" content=\"Cyberwatch 15.0: Discover the new features of the Cyberwatch vulnerability management software. Read the article...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberwatch\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-06T13:42:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-14T14:13:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/10\/Release-Cyberwatch-Cyberwatch-15.0.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"cyberwatch\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cyberwatch\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/\"},\"author\":{\"name\":\"cyberwatch\",\"@id\":\"https:\/\/cyberwatch.fr\/en\/#\/schema\/person\/293954835744eee8267f0877f4e01d7a\"},\"headline\":\"Cyberwatch 15.0: Discover the new major version of Cyberwatch\",\"datePublished\":\"2025-10-06T13:42:00+00:00\",\"dateModified\":\"2026-04-14T14:13:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/\"},\"wordCount\":550,\"publisher\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/10\/Release-Cyberwatch-Cyberwatch-15.0.png\",\"articleSection\":[\"news\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/\",\"url\":\"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/\",\"name\":\"Cyberwatch 15.0: Discover the new major version of Cyberwatch - Cyberwatch\",\"isPartOf\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/10\/Release-Cyberwatch-Cyberwatch-15.0.png\",\"datePublished\":\"2025-10-06T13:42:00+00:00\",\"dateModified\":\"2026-04-14T14:13:51+00:00\",\"description\":\"Cyberwatch 15.0: Discover the new features of the Cyberwatch vulnerability management software. Read the article...\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/#primaryimage\",\"url\":\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/10\/Release-Cyberwatch-Cyberwatch-15.0.png\",\"contentUrl\":\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/10\/Release-Cyberwatch-Cyberwatch-15.0.png\",\"width\":1200,\"height\":628,\"caption\":\"Cyberwatch 15.0 : d\u00e9couvrez les fonctionnalit\u00e9s de la toute nouvelle version majeure de Cyberwatch.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyberwatch.fr\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberwatch 15.0: Discover the new major version of Cyberwatch\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberwatch.fr\/en\/#website\",\"url\":\"https:\/\/cyberwatch.fr\/en\/\",\"name\":\"Cyberwatch\",\"description\":\"Supervisez vos vuln\u00e9rabilit\u00e9s. Contr\u00f4lez vos conformit\u00e9s.\",\"publisher\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberwatch.fr\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberwatch.fr\/en\/#organization\",\"name\":\"Cyberwatch\",\"url\":\"https:\/\/cyberwatch.fr\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberwatch.fr\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/logo_simple_black.png\",\"contentUrl\":\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/logo_simple_black.png\",\"width\":1883,\"height\":500,\"caption\":\"Cyberwatch\"},\"image\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cyberwatch.fr\/en\/#\/schema\/person\/293954835744eee8267f0877f4e01d7a\",\"name\":\"cyberwatch\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/101313e5d1b026340734cf30d8a7384c2f1121b0ec2abca7b34cec6975ffb5fd?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/101313e5d1b026340734cf30d8a7384c2f1121b0ec2abca7b34cec6975ffb5fd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/101313e5d1b026340734cf30d8a7384c2f1121b0ec2abca7b34cec6975ffb5fd?s=96&d=mm&r=g\",\"caption\":\"cyberwatch\"},\"sameAs\":[\"https:\/\/cyberwatch.fr\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberwatch 15.0: Discover the new major version of Cyberwatch - Cyberwatch","description":"Cyberwatch 15.0: Discover the new features of the Cyberwatch vulnerability management software. Read the article...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/","og_locale":"en_US","og_type":"article","og_title":"Cyberwatch 15.0: Discover the new major version of Cyberwatch - Cyberwatch","og_description":"Cyberwatch 15.0: Discover the new features of the Cyberwatch vulnerability management software. Read the article...","og_url":"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/","og_site_name":"Cyberwatch","article_published_time":"2025-10-06T13:42:00+00:00","article_modified_time":"2026-04-14T14:13:51+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/10\/Release-Cyberwatch-Cyberwatch-15.0.png","type":"image\/png"}],"author":"cyberwatch","twitter_card":"summary_large_image","twitter_misc":{"Written by":"cyberwatch","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/#article","isPartOf":{"@id":"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/"},"author":{"name":"cyberwatch","@id":"https:\/\/cyberwatch.fr\/en\/#\/schema\/person\/293954835744eee8267f0877f4e01d7a"},"headline":"Cyberwatch 15.0: Discover the new major version of Cyberwatch","datePublished":"2025-10-06T13:42:00+00:00","dateModified":"2026-04-14T14:13:51+00:00","mainEntityOfPage":{"@id":"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/"},"wordCount":550,"publisher":{"@id":"https:\/\/cyberwatch.fr\/en\/#organization"},"image":{"@id":"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/10\/Release-Cyberwatch-Cyberwatch-15.0.png","articleSection":["news"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/","url":"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/","name":"Cyberwatch 15.0: Discover the new major version of Cyberwatch - Cyberwatch","isPartOf":{"@id":"https:\/\/cyberwatch.fr\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/#primaryimage"},"image":{"@id":"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/10\/Release-Cyberwatch-Cyberwatch-15.0.png","datePublished":"2025-10-06T13:42:00+00:00","dateModified":"2026-04-14T14:13:51+00:00","description":"Cyberwatch 15.0: Discover the new features of the Cyberwatch vulnerability management software. Read the article...","breadcrumb":{"@id":"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/#primaryimage","url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/10\/Release-Cyberwatch-Cyberwatch-15.0.png","contentUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2025\/10\/Release-Cyberwatch-Cyberwatch-15.0.png","width":1200,"height":628,"caption":"Cyberwatch 15.0 : d\u00e9couvrez les fonctionnalit\u00e9s de la toute nouvelle version majeure de Cyberwatch."},{"@type":"BreadcrumbList","@id":"https:\/\/cyberwatch.fr\/en\/news\/cyberwatch-15-new-major-version-of-cyberwatch\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberwatch.fr\/en\/"},{"@type":"ListItem","position":2,"name":"Cyberwatch 15.0: Discover the new major version of Cyberwatch"}]},{"@type":"WebSite","@id":"https:\/\/cyberwatch.fr\/en\/#website","url":"https:\/\/cyberwatch.fr\/en\/","name":"Cyberwatch","description":"Supervisez vos vuln\u00e9rabilit\u00e9s. Contr\u00f4lez vos conformit\u00e9s.","publisher":{"@id":"https:\/\/cyberwatch.fr\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberwatch.fr\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberwatch.fr\/en\/#organization","name":"Cyberwatch","url":"https:\/\/cyberwatch.fr\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberwatch.fr\/en\/#\/schema\/logo\/image\/","url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/logo_simple_black.png","contentUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/logo_simple_black.png","width":1883,"height":500,"caption":"Cyberwatch"},"image":{"@id":"https:\/\/cyberwatch.fr\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cyberwatch.fr\/en\/#\/schema\/person\/293954835744eee8267f0877f4e01d7a","name":"cyberwatch","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/101313e5d1b026340734cf30d8a7384c2f1121b0ec2abca7b34cec6975ffb5fd?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/101313e5d1b026340734cf30d8a7384c2f1121b0ec2abca7b34cec6975ffb5fd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/101313e5d1b026340734cf30d8a7384c2f1121b0ec2abca7b34cec6975ffb5fd?s=96&d=mm&r=g","caption":"cyberwatch"},"sameAs":["https:\/\/cyberwatch.fr"]}]}},"_links":{"self":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/posts\/10098","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/comments?post=10098"}],"version-history":[{"count":2,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/posts\/10098\/revisions"}],"predecessor-version":[{"id":10114,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/posts\/10098\/revisions\/10114"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/media\/9243"}],"wp:attachment":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/media?parent=10098"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/categories?post=10098"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/tags?post=10098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}