The rise in remote work has led to a surge in cybersecurity threats. Recent data showed an average of 419 new threats per minute in the second quarter of 2020, as well as a 605% increase in COVID-19-related attack detections.
It’s not surprising that the World Economic Forum’s COVID-19 Risks Outlook found that 50% of enterprises were concerned about increased cyberattacks due to a shift in work patterns. In addition, eight of ten cybersecurity markets are projected to grow faster than the market average.
But many in-house IT teams cannot keep up with the cybersecurity threats that are constantly looming on the horizon. As a result, companies that specialize in cybersecurity offerings are launching new products at a faster rate.
Data center services provider US Signal, for example, just announced the release of Vulnerability Management as a Service (VMaaS), which is designed to help resource-strapped IT teams proactively identify, classify, prioritize, and remediate network vulnerabilities.
The offering allows companies to install a selection of vulnerability scanning tools on the IT network, as well as choose the best mix of scanning tools for their environment. They can also buy a one-time vulnerability management report or subscribe to quarterly, monthly, or weekly updates.
The VMaaS offering utilizes external, internal, and agent-based vulnerability scanners. While the external scanners provide an outside-in view to examine internet-connected portions of an IT environment, the internal scanners use an inside view to find vulnerabilities that exist from inside the network perimeter. And agent-based scanners can detect other vulnerabilities such as open ports or unpatched software PCs, laptops, and other equipment.
Trevor Bidle, CISO at US Signal said, “US Signal’s VMaaS offering provides valuable insight to overburdened IT teams, allowing them to focus on critical vulnerabilities to reduce their risk and limit exposure to threats such as ransomware. It also supports organizations that might not have enough security staff onsite or who wish to apply third-party checks and balances to ensure they are correctly and diligently implementing their security policies.”