
Secunia.com 5
The Secunia CSI 7.0
The Secunia CSI 7.0 is a Vulnerability and Patch Management Software Solution that
completes and targets the Patch Management process. It combines Vulnerability Intelligence,
Vulnerability Scanning, and Patch Creation with Patch Deployment Tool Integration to enable
targeted, reliable, and cost-efficient Patch Management.
Vulnerability and Patch Management are critical components of any security infrastructure
because it enables proactive detection and remediation of vulnerabilities before they are
actively exploited and your security compromised. With the Secunia CSI, IT Operations and
Security Teams are empowered to take control of the Vulnerability Threat from both Microsoft
and non-Microsoft (third-party) product vulnerabilities, covering Microsoft Windows, Mac OSX,
Android and Red Hat Enterprise Linux.
The Secunia scanning technology takes a different approach than other vulnerability scanning
solutions by conducting non-intrusive scans to accurately identify all installed products and
plugins on the system.
The Secunia CSI integrates seamlessly with Microsoft WSUS, SC2012 and System Center
Configuration Manager (SCCM) 2007.
The Scan Process – How Does it Work?
The first step in scanning a system is to collect specific metadata from primarily .EXE, .DLL,
and .OCX files on the system being scanned. Metadata is generic non-sensitive text strings
embedded in the binary files from the vendors of the products. This data is collected and then
sent to Secunia's Secure Data Processing Cloud where it is processed and parsed.
Detailed information about which data is collected can be found in the Secunia Data Security
Factsheet available for download in the following location:
http://secunia.com/?action=fetch&filename=Secunia_DataSecurity.pdf
The data is then matched against Secunia File Signatures, which are rules that match the raw
metadata to an actual product installation.
Part of this matching process also results in an exact version being extracted from the
metadata. This means that after the initial parsing the Secunia CSI knows exactly which
products are on the system and their exact version – a precise inventory of software on the
system.
The inventory of software is then compared against the unique Secunia Advisory and
Vulnerability Database, which contains the most accurate and current Vulnerability Intelligence
available.
The result is a precise inventory of products, their versions, the security state of each, along
with a direct reference to any corresponding Secunia Advisory detailing the exact
vulnerabilities and their Secunia assessed criticality and impact.
Since the scan process works by looking at the actual files on the system being scanned, the
result is extremely reliable as a product cannot be installed on a system without the actual files
required being present.
This in turn means that the Secunia CSI rarely identifies false-positives and you can use the
results from the Secunia CSI immediately without doing additional data mining.
The Secunia CSI is flexible and scalable when it comes to scanning a corporate network and
you can choose to use Agent, Agent-less, or a combination of both scanning methods in the
same environment.
Refer to Scanning for further information about the different scanning approaches.
Commenti su questo manuale