DeepSurface integrates with Microsoft's vulnerability management capabilities

Published Aug 04 2021 08:19 AM 4,039 Views
Microsoft

Today, we are excited to announce that predictive vulnerability management platform, DeepSurface, has integrated across our threat and vulnerability management capabilities in Microsoft Defender for Endpoint. Now, Microsoft Defender for Endpoint customers can import vulnerability information across Microsoft, Linux and MacOS hosts directly into the DeepSurface vulnerability management platform, further strengthening our focus on interoperability.

 

“As the volume of vulnerabilities increases, it’s critical that vulnerability management teams can quickly identify which matter to their domain and filter out any that don’t pose any risk to their organization. The status quo has been to juggle multiple platforms and spend hours manually prioritizing vulnerabilities - this integration between Microsoft and DeepSurface streamlines the number of platforms for end-users and provides comprehensive, real-time insight into their threat stance.” – Tomer Teller, Principal Security PM Lead, Threat & Vulnerability Management at Microsoft

 

DeepSurface considers more than 50 different attributes of an environment to contextualize vulnerabilities – and chains of vulnerabilities – within an organization’s digital infrastructure to predict where an attacker could cause the most damage and provides users with actionable intelligence on how to reduce the most risk, fastest. Now, users of Microsoft Defender for Endpoint have an integrated solution, easily operationalized in just a few minutes, that provides them with at-a-glance insight into their threat stance.

 

Image 1 shows DeepSurface’s Risk Insight model. The paretograph shows all the patches on your network and the relative risk they pose to your business, as well as the number of affected hosts and number of vulnerabilities on your network.Image 1 shows DeepSurface’s Risk Insight model. The paretograph shows all the patches on your network and the relative risk they pose to your business, as well as the number of affected hosts and number of vulnerabilities on your network.

 

 

DeepSurface integrates with Microsoft Defender for Endpoint APIs to collect vulnerabilities and identify missing patches, then prioritizes the patches, hosts and vulnerabilities based on a holistic threat model of your infrastructure.

 

Image 2 shows the risk pathways or hacker roadmap of vulnerabilities and chains of vulnerabilities that could be exploited on a network. By visualizing the most exploitable risk paths, DeepSurface can help you identify which paths pose the most risk to your business and prioritize where to patch first.Image 2 shows the risk pathways or hacker roadmap of vulnerabilities and chains of vulnerabilities that could be exploited on a network. By visualizing the most exploitable risk paths, DeepSurface can help you identify which paths pose the most risk to your business and prioritize where to patch first.

 

 

When viewing a specific patch, DeepSurface can show users which hosts are affected, and the severity of the risk for each host after taking the holistic context of your network into account.  DeepSurface also provides information about patch supersedence, and extra steps required to fully mitigate the vulnerabilities covered by the patch.

 

Integration is quick and seamless. All you have to do is add your API key to the DeepSurface console (see screenshot below). Documentation is available for DeepSurface customers.

 

Image 3: DeepSurface setup console to configure the Microsoft Defender for Endpoint integration.Image 3: DeepSurface setup console to configure the Microsoft Defender for Endpoint integration.

 

 

For additional details, you can view the full press release here.

 

At Microsoft, we believe that when solutions work well together, customers benefit and can build stronger defenses. That’s why the Microsoft threat and vulnerability management APIs give partners like DeepSurface, as well as security full access to the threat and vulnerability management dataset, allowing them to build integrations or other custom workflows.

 

More information and feedback

  • The threat and vulnerability management capabilities are part of Microsoft Defender for Endpoint and enable organizations to effectively identify, assess, and remediate endpoint weaknesses to reduce organizational risk.
  • Documentation on how to configure the integration is available for DeepSurface customers in the product portal.
  • We want to hear from you! If you have any suggestions, questions, or comments, please visit us on our Tech Community page.
1 Comment
New Contributor

looking forward to have playground 

%3CLINGO-SUB%20id%3D%22lingo-sub-2544600%22%20slang%3D%22en-US%22%3EDeepSurface%20integrates%20with%20Microsoft's%20vulnerability%20management%20capabilities%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2544600%22%20slang%3D%22en-US%22%3E%3CP%3EToday%2C%20we%20are%20excited%20to%20announce%20that%20predictive%20vulnerability%20management%20platform%2C%20%3CA%20href%3D%22https%3A%2F%2Fdeepsurface.com%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EDeepSurface%3C%2FA%3E%2C%20has%20integrated%20across%20our%20threat%20and%20vulnerability%20management%20capabilities%20in%20Microsoft%20Defender%20for%20Endpoint.%20Now%2C%20Microsoft%20Defender%20for%20Endpoint%20customers%20can%20import%20vulnerability%20information%20across%20Microsoft%2C%20Linux%20and%20MacOS%20hosts%20directly%20into%20the%20DeepSurface%20vulnerability%20management%20platform%2C%20further%20strengthening%20our%20focus%20on%20interoperability.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3E%E2%80%9CAs%20the%20volume%20of%20vulnerabilities%20increases%2C%20it%E2%80%99s%20critical%20that%20vulnerability%20management%20teams%20can%20quickly%20identify%20which%20matter%20to%20their%20domain%20and%20filter%20out%20any%20that%20don%E2%80%99t%20pose%20any%20risk%20to%20their%20organization.%20The%20status%20quo%20has%20been%20to%20juggle%20multiple%20platforms%20and%20spend%20hours%20manually%20prioritizing%20vulnerabilities%20-%20this%20integration%20between%20Microsoft%20and%20DeepSurface%20streamlines%20the%20number%20of%20platforms%20for%20end-users%20and%20provides%20comprehensive%2C%20real-time%20insight%20into%20their%20threat%20stance.%E2%80%9D%3C%2FEM%3E%20%E2%80%93%20Tomer%20Teller%2C%20Principal%20Security%20PM%20Lead%2C%20Threat%20%26amp%3B%20Vulnerability%20Management%20at%20Microsoft%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EDeepSurface%20considers%20more%20than%2050%20different%20attributes%20of%20an%20environment%20to%20contextualize%20vulnerabilities%20%E2%80%93%20and%20chains%20of%20vulnerabilities%20%E2%80%93%20within%20an%20organization%E2%80%99s%20digital%20infrastructure%20to%20predict%20where%20an%20attacker%20could%20cause%20the%20most%20damage%20and%20provides%20users%20with%20actionable%20intelligence%20on%20how%20to%20reduce%20the%20most%20risk%2C%20fastest.%20Now%2C%20users%20of%20Microsoft%20Defender%20for%20Endpoint%20have%20an%20integrated%20solution%2C%20easily%20operationalized%20in%20just%20a%20few%20minutes%2C%20that%20provides%20them%20with%20at-a-glance%20insight%20into%20their%20threat%20stance.%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22pic1.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F300311iF08596F6BD7071D5%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22pic1.png%22%20alt%3D%22Image%201%20shows%20DeepSurface%E2%80%99s%20Risk%20Insight%20model.%20The%20paretograph%20shows%20all%20the%20patches%20on%20your%20network%20and%20the%20relative%20risk%20they%20pose%20to%20your%20business%2C%20as%20well%20as%20the%20number%20of%20affected%20hosts%20and%20number%20of%20vulnerabilities%20on%20your%20network.%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EImage%201%20shows%20DeepSurface%E2%80%99s%20Risk%20Insight%20model.%20The%20paretograph%20shows%20all%20the%20patches%20on%20your%20network%20and%20the%20relative%20risk%20they%20pose%20to%20your%20business%2C%20as%20well%20as%20the%20number%20of%20affected%20hosts%20and%20number%20of%20vulnerabilities%20on%20your%20network.%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EDeepSurface%20integrates%20with%20Microsoft%20Defender%20for%20Endpoint%20APIs%20to%20collect%20vulnerabilities%20and%20identify%20missing%20patches%2C%20then%20prioritizes%20the%20patches%2C%20hosts%20and%20vulnerabilities%20based%20on%20a%20holistic%20threat%20model%20of%20your%20infrastructure.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22image2.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F300312iEF07A21EDD05BD50%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22image2.png%22%20alt%3D%22Image%202%20shows%20the%20risk%20pathways%20or%20hacker%20roadmap%20of%20vulnerabilities%20and%20chains%20of%20vulnerabilities%20that%20could%20be%20exploited%20on%20a%20network.%20By%20visualizing%20the%20most%20exploitable%20risk%20paths%2C%20DeepSurface%20can%20help%20you%20identify%20which%20paths%20pose%20the%20most%20risk%20to%20your%20business%20and%20prioritize%20where%20to%20patch%20first.%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EImage%202%20shows%20the%20risk%20pathways%20or%20hacker%20roadmap%20of%20vulnerabilities%20and%20chains%20of%20vulnerabilities%20that%20could%20be%20exploited%20on%20a%20network.%20By%20visualizing%20the%20most%20exploitable%20risk%20paths%2C%20DeepSurface%20can%20help%20you%20identify%20which%20paths%20pose%20the%20most%20risk%20to%20your%20business%20and%20prioritize%20where%20to%20patch%20first.%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EWhen%20viewing%20a%20specific%20patch%2C%20DeepSurface%20can%20show%20users%20which%20hosts%20are%20affected%2C%20and%20the%20severity%20of%20the%20risk%20for%20each%20host%20after%20taking%20the%20holistic%20context%20of%20your%20network%20into%20account.%26nbsp%3B%20DeepSurface%20also%20provides%20information%20about%20patch%20supersedence%2C%20and%20extra%20steps%20required%20to%20fully%20mitigate%20the%20vulnerabilities%20covered%20by%20the%20patch.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EIntegration%20is%20quick%20and%20seamless.%20All%20you%20have%20to%20do%20is%20add%20your%20API%20key%20to%20the%20DeepSurface%20console%20(see%20screenshot%20below).%20Documentation%20is%20available%20for%20DeepSurface%20customers.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22image3.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F300314i60963D3D799C7D2B%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22image3.png%22%20alt%3D%22Image%203%3A%20DeepSurface%20setup%20console%20to%20configure%20the%20Microsoft%20Defender%20for%20Endpoint%20integration.%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EImage%203%3A%20DeepSurface%20setup%20console%20to%20configure%20the%20Microsoft%20Defender%20for%20Endpoint%20integration.%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EFor%20additional%20details%2C%20you%20can%20%3CA%20href%3D%22https%3A%2F%2Fwww.prnewswire.com%2Fnews-releases%2Fdeepsurface-security-announces-integration-with-microsoft-defender-for-endpoint-301347917.html%3Ftc%3Deml_cleartime%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3Eview%20the%20full%20press%20release%20here.%3C%2FA%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EAt%20Microsoft%2C%20we%20believe%20that%20when%20solutions%20work%20well%20together%2C%20customers%20benefit%20and%20can%20build%20stronger%20defenses.%20That%E2%80%99s%20why%20the%20Microsoft%20threat%20and%20vulnerability%20management%20APIs%20give%20partners%20like%20DeepSurface%2C%20as%20well%20as%20security%20full%20access%20to%20the%20threat%20and%20vulnerability%20management%20dataset%2C%20allowing%20them%20to%20build%20integrations%20or%20other%20custom%20workflows.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EMore%20information%20and%20feedback%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EThe%20threat%20and%20vulnerability%20management%20capabilities%20are%20part%20of%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fthreat-protection%2Fendpoint-defender%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Defender%20for%20Endpoint%3C%2FA%3E%20and%20enable%20organizations%20to%20effectively%20identify%2C%20assess%2C%20and%20remediate%20endpoint%20weaknesses%20to%20reduce%20organizational%20risk.%3C%2FLI%3E%0A%3CLI%3EDocumentation%20on%20how%20to%20configure%20the%20integration%20is%20available%20for%20DeepSurface%20customers%20in%20the%20product%20portal.%3C%2FLI%3E%0A%3CLI%3EWe%20want%20to%20hear%20from%20you!%20If%20you%20have%20any%20suggestions%2C%20questions%2C%20or%20comments%2C%20please%20visit%20us%20on%20our%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-defender-for-endpoint%2Fbd-p%2FMicrosoftDefenderATP%22%20target%3D%22_blank%22%3ETech%20Community%20page%3C%2FA%3E.%3C%2FLI%3E%0A%3C%2FUL%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2544600%22%20slang%3D%22en-US%22%3E%3CP%3EDeepSurface%2C%20has%20integrated%20across%20Microsoft's%20threat%20and%20vulnerability%20management%20capabilities.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2544600%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EThreat%20%26amp%3B%20Vulnerability%20Management%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2618336%22%20slang%3D%22en-US%22%3ERe%3A%20DeepSurface%20integrates%20with%20Microsoft's%20vulnerability%20management%20capabilities%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2618336%22%20slang%3D%22en-US%22%3E%3CP%3Elooking%20forward%20to%20have%20playground%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Co-Authors
Version history
Last update:
‎Aug 04 2021 08:19 AM
Updated by:
www.000webhost.com