Skip to main content

LevelBlue Named Official Cybersecurity Advisor of the PGA of America. Learn more

LevelBlue Named Official Cybersecurity Advisor of the PGA of America. Learn more

Services
Cyber Advisory
Managed Cloud Security
Data Security
Managed Detection & Response
Email Security
Managed Network Infrastructure Security
Exposure Management
Security Operations Platforms
Incident Readiness & Response
SpiderLabs Threat Intelligence
Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Operational Technology
End-to-end OT security
Microsoft
Unlock the full power of Microsoft Security
Securing the IoT Landscape
Test, monitor and secure network objects
Why LevelBlue
About Us
Awards and Accolades
LevelBlue SpiderLabs
PGA of America Partnership
Secure What's Next
LevelBlue Security Operations Platforms
Security Colony
Partners
Microsoft
Unlock the full power of Microsoft Security
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Loading...
Loading...

FAQ: CVE vulnerability - general information

Expand / Collapse


  • Question
    How can I determine if my Finjan solution provides protection against a specific vulnerability or attack?

  • Answer

    Finjan Vital Security Web Appliances provide both reactive (signature-based) and proactive (behavior-based) protection though their Vulnerability Anti.dote™ and Application Level Behavior Blocking engines, respectively.  These security engines help to mitigate new exploits based on known vulnerabilities.  In many cases, they also stop new threats based on unknown vulnerabilities.

    From time to time vendors publish official statements, revealing details about new vulnerabilities or exposures that are related to their products.  For example, Microsoft typically releases security bulletins on the second Tuesday of every month.  The Common Vulnerabilities and Exposures (CVE) system provides a global, cross-vendor reference method for publicly known information security vulnerabilities and exposures.  Each vendor alert is typically related to one or more CVE numbers.  The CVE web page linked below inlcudes a search mechanism that can be used to look up vulnerabilities by CVE numbers or vendor identifiers.

    http://cve.mitre.org/cve/cve.html

    When researching a particular vulnerability, open a Finjan support case to receive information regarding the level of protection provided by a Finjan solution.  To identify the vulnerability under investigation, please provide its CVE number in the support case.  If there is any other information that could prove helpful, please provide it as well.  Such information can include:

    • vendor identifiers
    • links to web pages that discuss the vulnerability
    • e-mails that discuss the vulnerability

  • Software Version
    all

  • This article was previously published as:
    Finjan KB 12677

    To contact LevelBlue about this article or to request support:


    Rate this Article:
         

    Add Your Comments


    Comment submission is disabled for anonymous users.
    Please send feedback to Trustwave Technical Support or the Webmaster
    .