• Facebook
  • Youtube
  • Twitter
  • Linkedin
  • Italiano Italiano Italiano it
  • English English Inglese en
Alfa Group
  • Soluzioni
    • Enterprise Cyber Security
      • Fraud Management
      • Vulnerability Management
      • Cyber Defence
      • ICS Cyber Defence
      • Cyber Intelligence
      • Strategy & Risk Management
    • Business Process Management
    • ERP e Sistemi Gestionali
  • Consulenza
    • Settore finanziario
    • Aerospazio e difesa
    • Settore produttivo
    • Settore servizi
  • Software Factory
    • RHD
  • Partner
    • Partnership
    • Membership
  • Il gruppo
    • Alfa System
    • GSI
    • Alfa SAP
    • Alfa Project
  • News&Events
    • Video
  • Contatti
  • Careers
  • Assistenza

Discover RHD VM :
Alfa Group’s solution for Vulnerability Management

RHD VM is the solution based on the RHD Business Platform specifically addressing Vulnerability Management issues.

Combining industry-leading Vulnerability Management technologies with RHD’s Case Management and Orchestration engine, RHD VM allows the entire lifecycle of vulnerability management to be part of an integrated and continuous security process, resulting in better risk management and efficient remediation flow.

DOWNLOAD BROCHURE

TECHNOLOGY INTEGRATION

Gather information from industry-leading VM technologies

Learn More

REMEDIATION
FLOW

Easily manage the entire process of vulnerability remediation

Learn More

RISK
MANAGER

Define asset criticality and efficiently prioritize your actions

Learn More

VA TREND
& ANALYTICS

Get immediate view of vulnerabilities status, analytics and trends

Learn More

Technology Integration

Gather information from industry-leading Vulnerability Management technologies

Through TDI Module, Web Services and Custom connectors, RHD is able to communicate bidirectionally with other technologies and software; this allows for the collection and the automated exchange of information from different sources for feeding the processes.

RHD VM’s integration with other Vulnerability Management technologies enhances the governance of Infrastructure and Application  Vulnerabilities Lifecycle Management by adding an efficient remediation process, which can be readily customised according to specific needs. Through the enrichment of assets and vulnerabilities with business context and Threat Intelligence data, RHD VM generates a risk score to prioritise remediation activities.

1
2
1

REMEDIATION FLOW: PROCESS DESIGN & MANAGEMENT

The RHD process builder allows the configuration, in a no-code environment and without the need for programming, of the main elements of the remediation process and interface.

2

REMEDIATION PROGRESS & DETAILS

The case status is constantly visible through progress bars, both available in the Vulnerability view and among the involved Asset detail, showing the ongoing evolution of the Remediation process and its point in time status.

Remediation Flow

Easily manage the entire process of vulnerability remediation

RHD VM allows agile management of the remediation flow for each detected vulnerability, thanks to RHD’s visual process design configuration features.

Straight from the detailed view of each detected vulnerability, RHD VM allows the opening of remediation cases which already include all of the gathered data related to it, such as: severity of the vulnerability, detailed information, involved assets, associated risk level, threat intelligence information, etc…

The case status is constantly visible through progress bars, both available in the Vulnerability view and among the involved Asset detail, showing the ongoing evolution of the Remediation process and its point in time status.

Risk Manager

Define asset criticality and efficiently prioritize your actions

RHD VM enables the prioritization of risks and remediations combining the action of Vulnerability Management technologies already present in the organization with the built-in Asset Manager.

A criticality index can be associated to any asset, to thoroughly evaluate the business risk of the assets and prioritize remediations; this index can also be the result of enrichment coming from other sources, such as (but not limited to) threat intelligence feeds.

This provides an unparalleled Business Risk contextualization and allows to timely and efficiently address remediation prioritization, risk level and remediation cross checks and feedback.

1
2
3
4
5
6
7
1

RISK INDEX

2

SEVERITY INDEX

3

Risk evaluated on VM and incident

4

Asset Incident list

5

Asset Vulnerability list

6

Asset Vulnerability list

7

Incidents from Threat Intelligence

1
2
1

REAL-TIME VULNERABILITY OVERVIEW:

Dashboards provide real-time information about the status of the performed detections and the current level of risk associated to every monitored asset;

2

DATA DRILL-DOWN

Detail Views enable the analysis of the gathered data, organizing them according to the specific needs and providing useful information to the Remediation Process; all information can be exported in a variety of file formats or used as input to other RHD modules.

VA trends &Analytics

Get immediate and precise view of vulnerabilities status, analytics and trends

Data visualization featured in RHD VM allows an overall and immediate visualization of vulnerabilities acquired by the RHD Connector, that can bidirectionally interface any Vulnerability Assessment tool and use graph and charts organized in customizable dashboards, giving at the same time the opportunity to drill-down the details of Assets, Vulnerabilities, remediations, risks at different levels of depth. Dashboards and detailed views are both adaptable to the specific needs of the company through the use of customizable widgets.

DO YOU WANT TO START DESIGNING THE RIGHT SOLUTION FOR YOUR COMPANY?

CONTACT US

Alfa Group

Via Fiume Giallo, 3
00144 Roma (RM)

Tel.: +39 06 52244040
Fax: +39 06 52244427
info@alfagroup.it

Menù

  • Gestione processi aziendali
  • Sicurezza informatica
  • Gestionali piccole e medie imprese
  • Software Factory
  • Consulenza
  • Partner
  • Contatti

News

  • Alfa Group al Security Summit Streaming Edition con l’Atelier Tecnologico: “Teoria della Relatività della Cyber Intelligence”6 Novembre 2020 - 12:53
  • Webinar: Piano Transizione 4.0: scopri gli incentivi per la tua azienda e riparti subito!23 Giugno 2020 - 15:33
  • Webinar: PROACTIVE CYBER FRAUD INTELLIGENCE- Affrontare la crescita del Financial E-Crime in era COVID-199 Giugno 2020 - 16:53
  • Comunicato Stampa: Q6 Cyber sceglie Alfa Group per portare l’E-Crime Intelligence in EU e UK8 Giugno 2020 - 11:01

Certificazioni

Certificazioni
Copyright © 2015 Alfa System SpA - P. IVA e C.F. 05174111004 - R.E.A. 849404 - Cap. soc. € 400.000,00 i.v. Privacy Policy
  • Facebook
  • Youtube
  • Twitter
  • Linkedin
Scorrere verso l’alto