View our recent platform additions/modifications
View in browser
fortifydata_email_header

Hi there,

Please find FortifyData's October 21st Release Notes! 

Enhancements

 

Detailed information in the event log for domains changes:

  • domain name
  • time when that has been performed
  • username and company that make the changes

The event log to now include information about Portfolios including details for user that performs this activity

  • when a user adds a new Subsidiary in a Portfolio
  • when a user removes a Subsidiary from a Portfolios

All types of Threat Intelligence records are now accessible in the asset details pop-up for both Internal and External assets.

  • Clicking on a Threat Intelligence record containing an asset name or IP will direct the user to the relevant page and automatically apply a filter to the findings. 

Vulnerability chaining for Internal, External, and Web vulnerabilities across Enterprise and Third-party systems will also be displayed in Portfolios.

  • Vulnerability chaining is a commonly used technique in hacker tradecraft, especially during the reconnaissance phase. As hackers map out a target’s digital footprint, they identify both direct and peripheral vulnerabilities in hardware and software, which they can exploit.
fortifydata-releasenotes-oct21-vulnchaining
  • API to include a “unique ID” for each vulnerability for Infrastructure and Web application end points
foritfydata-releasenotes-oct21-api-referenceid

Should you have any questions regarding these updates, please reach out to FortifyData or simply reply to this email. 

LinkedIn
Website
X
YouTube

FortifyData, 1720 Mars Hill Road, Suite 124-181, Acworth, GA 30101, United States, 888-396-4110

Unsubscribe Manage preferences