Vulnerability Response correlation

Vulnerability Response data correlation is performed using groups, calculators, and libraries.

You can do the following:
  • Create vulnerability groups to contain vulnerable items from NVD, CWE, and third-party integrations. Assign prioritization, rules, and access.
  • Create vulnerability group rules based on vulnerabilities, filters, filter conditions, and group keys.
  • Use calculator groups to determine business impact, specify varying conditions using filters, apply simple calculations or use a script.
  • View ungrouped vulnerable items
  • View vulnerabilities