Vulnerability prioritization

Identify and prioritize the most recent and massively exploited vulnerabilities that could affect your assets with the “trending attacks” feature.

Ask a free demo

Vulnerability prioritization tool

In addition to continuous penetration testing, Patrowl acts as CERT (Computer Emergency Response Team), monitoring threats in real time to keep abreast of recent vulnerabilities and large-scale reported threats.

When new critical vulnerabilities are exploited or a new exploit is detected, Patrowl instantly checks your assets exposed to the Internet. Some of these vulnerabilities are taken from CISA's Known Exploited Vulnerabilities (KEV) catalog.

External asset security

Only pentested assets will be evaluated for these vulnerabilities, providing you with information about their vulnerability (impacted or unimpacted).

For non-penetrated assets, Patrowl will only identify the risks as potential, with a warning. They must be subjected to a penetration test to confirm their potentiality.

  • Impacted: if an exploit code is available, it will be tested by Patrowl to stabilize it, and then run on all your tested assets, to check if you are impacted.

  • Warning: if the exploit code is not yet available, Patrowl will check if there is an indication of the product concerned on your external attack surface (and not just on the pentified assets), and warn you of the product detected and its potential exploitation;

  • No impact: if nothing has been found and no exploit code is available, you risk nothing.

Asset management

  • continuous monitoring of emerging threats

  • automated testing of your pentested assets

  • real-time alerts on cyberthreats

Continuous monitoring of emerging threats

Patrowl's Trending Attacks category lists the latest massively reported and exploited vulnerabilities that could impact your assets. These vulnerabilities come from the KEV catalog published online by CISA (USA) or CERT alerts (France), and are constantly updated to facilitate your cyber watch.

For every new trending attack identified, Patrowl tests your assets placed under pentest and automatically transforms the threat into a vulnerability if you are impacted.

Automated testing of your pentest assets

For each trending attack identified, Patrowl performs automated tests on your assets under pentest. These tests determine whether your assets are vulnerable to the newly identified threat, enabling you to take action before the threat materializes.

Real-time alerts on cyberthreats

If a vulnerability is detected as a result of testing, you receive real-time alerts. These alerts enable you to react immediately, ensuring effective protection of your critical assets. You stay informed at all times about the risks that could affect your digital environment.