The Skopos platform detects and indicates what software needs to be patched in order to reduce the risk of exploitation the most. This is based on historical real world attacks. Skopos shows the few vulnerabilities that explain the majority of the risk . Vulnerabilities with a CVSS score of 3.0 can have a much higher real world risk compared to those with a 9.0.
The objective of Skopos is to create awareness by finding all known vulnerabilities on connected devices and offer an objective overview.
This way the solution can contribute to an improved vulnerability management process. Skopos automates the boring manual work and aggregates all relevant information around software and vulnerabilities. This way you and your team can focus on mitigation of risks, the creative side of the InfoSec job.
The core features of Skopos are a) detection of all vulnerabilities on connected devices, b) prioritization of vulnerabilities based on real world risk and c) presentation of the results along with necessary explanation on the Skopos dashboard.
Skopos has three core elements: provide insight in risk of vulnerabilities, predict where attacks are likely to happen and advice on how to mitigate:
A central dashboard captures the three features in one place. Insight in the amount, location and level of risk per vulnerability per server. A prediction and breakdown on which vulnerabilities are most likely to be exploited – based on historical attack data Finally, advice for high risk vulnerabilities on mitigation
The interface has been developed with users; is very intuitive and responsive. All the key risks visible in one glance. Next you have access to a historical overview of risks, vulnerabilities per server and risk spread. It can be at the CISO/CTO level of for separate divisions or segments. Key components are connected server(segments), risk exposure map, historical development of vulnerabilities and patches and activity of assets.
The asset overview shows all your connected assets, actual status and the amount of active vulnerabilities. This can be at an organizational, segment of division level.
The most detailed view is the asset or server view. This shows you at a detailed level all exposed software elements, their risk score and exploit-ability by attackers.
At a detailed level Skopos tells the user what the risk is, which devices are vulnerable and what exploits can be applied by attackers.
- Highest security standards
- We do all the heavy lifting of risk identification and alerting
- The client’s Security team can demonstrate to the business exactly when and where a risk was identified along with a detailed description of the impact
- The client’s Security team can demonstrate leadership to keep customers and clients safe
- The client’s Security team can demonstrate rapid response and the effect of the mitigation, e.g. show what you have avoided for the business
Skopos is a SaaS B2B. We charge on a ‘per server per month’ basis depending the amount of servers connected.
The product is designed for any size of network and is a SaaS. Data can be stored at the region of your choosing. Client servers connect via secure API to the Skopos Risk engine. Data and processes will meet the your standards e.g. 2FA access, encryption of the data at rest, access controls for user access.