Threat and Vulnerability Management
Detect and Mitigate vulnerabilities swiftly
Rising cyber-attacks and newly emerging security vulnerabilities bring unknown challenges to businesses of all shapes and sizes. Exposure to cyber risks can culminate into incidents such as cyber-attacks, malware infections, ransomware, web page compromises and data breaches.
We have developed comprehensive Threat and Vulnerability Management (TVM) Services that ensure holistic view of security vulnerabilities across the organization’s digital landscape.
Jio TVM services offer foundational layer security that help organizations identify vulnerabilities with security patching and hardening/ secure configuration of servers, containers, networking devices, virtualization layer, and Cloud infrastructure.
What you get with TVM
Know how each feature of TVM will help in transforming your business.
Variants
Go for the security SKUs with most feature aligned with your business requirements.
Features | Starter Pack | Advance Service | Expert Service |
---|---|---|---|
Vulnerability Scanning | |||
Authenticated scan: Scan performed with credentials of the system |
|
|
|
Detection of open N/W ports |
|
|
|
Discovering potential attack vectors in the system |
Partial
|
Full
|
Full
|
Security Patches required for the system |
Partial
|
Full
|
Full
|
Detailed review and verification of configuration settings |
|
|
|
Existence of assessment for weak authentication |
|
||
Minimum number of IPs/ active instances considered for scan |
10
|
25
|
50
|
Scan frequency (No. of scans/ month) |
1
|
2
|
Continuous/ on demand
|
Infrastructure and Platform Coverage | |||
Servers (Physical/ Virtual) |
|
|
|
Infrastructure systems and network devices |
|
|
|
Hypervisors |
|
|
|
Supported Cloud platform (AWS, Azure and GCP) |
|
|
|
Mainstream containers architecture supported |
|
||
Penetration Test | |||
White Box penetration testing (Internal network test with prior information about the network and internal systems) |
|
||
Black Box penetration testing (External network test, without prior knowledge of internal network and systems) |
|
|
|
Reports and Support | |||
Reporting |
|
|
|
Systematic and accurate briefing of issues |
|
|
|
Risk view - local and remotely hackable issues |
|
||
Remediation guidance |
|
|
|
Post remediation rescan |
|
|
|
Vulnerability Program Management | |||
Portal access |
|
||
Compliance management - PCI DSS, NIST and CIS |
|
|
|
Customised hardening guidelines for infrastructure components such as OS, NW, DB and MW |
|
||
End-to-end management of vulnerability during its lifecycle, from assessment to remediation support |
|
|
|
Automated tracking and mail notifications |
|
||
Management of reporting for security exceptions |
|
||
Zero Day Vulnerability (ZDV)- advisory and support (ZDV: An attack that has zero days between vulnerability being discovered and the first attack) |
|
Jio Advantage
Diversified advantages that Threat and Vulnerability Management brings to your business.
Terms and Conditions
Verify phone number
OTP limit exceeded
You've reached the maximum OTP limit for one day. Please try again
after 14:47 mins.
Still have questions?
Find answers to some of the commonly asked questions by our JioBusiness customers.
Tell us about your visit
Please select the emoji
that best describes your experience here.
Thank You
Were you able to complete your main purpose for your visit?
How can we improve our experience?