Category Archives: Vulnerability Management

Another Week, Another Integration: Retina meet Risk I/O

Andrea Bailiff-Gush    May 30, 2012

We’re beginning to sound a bit like a broken record, but yes, this week we launched another out-of-the-box integration with Risk I/O. Our goal has always been to build a complete vulnerability management platform that works with the tools you’re already using. That’s why we’ve added eEye Digital Security’s Retina Network Security Scanner to our arsenal of integrations. As a connector, you can… Read more »

Now Serving Veracode Users

Andrea Bailiff-Gush    May 15, 2012

Following our recent integration with Portswigger’s Burp web scanner, our development team has added another vulnerability assessment tool to Risk I/O. Integration with Veracode static analysis is now available! If you use Veracode to scan your applications for security flaws, you’ll be happy to learn that you can now plug it into Risk I/O to manage and monitor the vulnerabilities that… Read more »

Our Latest Integration

Ed Bellis    March 26, 2012

Hot on the heels of launching role-based access control which allows you to control who has access to what in Risk I/O (all the way down to the vulnerability level), we have added integration with a new vulnerability assessment tool. (Drum roll please…) We are happy to announce that integration with the Burp Scanner is now available in Risk I/O! For… Read more »

No More Traffic Signals

Ed Bellis    March 23, 2012

Red, Yellow, Ugh… I have been frustrated by the state of prioritization in security for several years. I recently wrote about how a data-driven approach can help prioritize remediation when there are a large amount of issues to contend with. It seems that much of the industry got together years ago and decided we could drop millions of issues into… Read more »

Special Orders Don’t Upset Us

Ed Bellis    January 18, 2012

Just a quick post to give you an update on one of our newest features. A few months back we wrote about custom fields in Risk I/O and how to add your own data and metadata to your vulnerabilities and assets. Today I’m writing about taking this customization to the next step. We recognize different people within your company are… Read more »

The Scanner That Cried Wolf

Ed Bellis    January 5, 2012

Dealing with false positives during a vulnerability assessment is a fact of life. As applications and infrastructure grow larger and more complex, the likelihood of running into these Type I errors increases along with it. Although these issues become more commonplace as you grow, there are a number of known ways to help decrease the amount of false positives that are produced… Read more »

Risk I/O Joins Rapid7’s Technology Alliances

Andrea Bailiff-Gush    December 14, 2011

We are pleased to announce our recent entry into the Technology Alliances program with Rapid7. Earlier this year, Rapid7 and Risk I/O collaborated to create a simple out-of-the-box connector that pulls vulnerability scan data directly from Rapid7’s Nexpose, and uses Risk I/O to aggregate, correlate and prioritize vulnerabilities for the most effective remediation of possible security threats. Through this collaboration, Nexpose users can… Read more »

Free As In Beer!

Ed Bellis    November 16, 2011

If you’ve been on our website lately, you may have noticed that our pricing page is looking a little different. We have recently restructured our pricing plans to allow organizations of all sizes—and with all kinds of budgets—to effectively manage and secure their data using Risk I/O. We are happy to announce that we’ve adopted a “freemium” pricing model for our plans… Read more »

Ohai HP – It’s Us Again

Ed Bellis    November 4, 2011

Fresh off the heals of launching our HP Fortify connector to integrate your static analysis findings, we’d like to announce our newest connector in the family. This time from HP’s dynamic side of the house – HP WebInspect. If you’re currently using this vulnerability assessment tool as part of your application security program, you can now connect your instance into Risk… Read more »