Tata Consultancy Services’ SaaS-based Platform Provides Risk-based Remediation Analytics to Help Enterprises Quickly and Efficiently Mitigate Risks
Tata Consultancy Services (TCS) announced the launch of its SaaS based Automated Vulnerability Remediation platform that helps enterprises stay one step ahead of malicious attacks by identifying and prioritizing vulnerabilities in their software libraries and proactively fixing them.
The TCS release stated “The Automated Vulnerability Remediation platform helps enterprises build and execute a contextual, risk-focused and effective vulnerability management programme, helping them decide on the right remediation approach across assets, across common vulnerabilities and patching,”
“The Automated Vulnerability Remediation platform helps enterprises build and execute a contextual, risk-focused and effective vulnerability management program, helping them decide on the right remediation approach across assets, across common vulnerabilities and patching. The platform also helps enterprises set vulnerability tolerance levels.”
The statement said “The platform provides inventory analysis, building a business and technical context around assets and driving consolidation; helps prioritize risks and vulnerabilities according to the business unit, location and asset type; tracks SLAs and KPIs, identifying and analyzing assets which don’t comply with internal SLAs; and automates vulnerability remediation. It helps enterprises map their business functions and processes, set SLAs for vulnerabilities and take appropriate mitigation measures.”
Commenting on the development, Santha Subramoni, Global Head, Cyber Security, TCS, said customers embarking on a legacy modernisation and cloud migration journey need to remediate pre-existing vulnerabilities and put in place processes and controls to mitigate new ones.
“TCS’ SaaS-based Automated Vulnerability Remediation platform provides risk-based remediation analytics to help security and IT operations teams quickly and efficiently mitigate known risks, and orchestrate vulnerability remediation – using the right patches, the best configuration scripts, and compensating controls,” Subramoni added.