Puppet launches its first vulnerability remediation product

Puppet Remediate is a vulnerability remediation product that shares data between security and IT ops, provides risk-based prioritization and offers agentless remediation.

Puppet has launched Puppet Remediate -- its first vulnerability remediation product. The product aims to reduce the time from vulnerability detection to remediation by unifying infrastructure and vulnerability data, quickly identifying which infrastructure resources are being impacted and taking immediate action to remediate vulnerabilities.

Key features of Puppet Remediate include the following:

  • Shared vulnerability data between security and IT ops: The platform unifies infrastructure data with vulnerability data from Tenable, Qualys and Rapid7. This prioritizes vulnerabilities while enabling IT ops to access vulnerability data in real time to reduce delays.
  • Risk-based prioritization: Puppet Remediate includes a dashboard that lists the most critical vulnerabilities to show IT ops which assets have vulnerabilities and which should be fixed first.
  • Agentless remediation: The product includes four prebuilt tasks, including the ability to update packages. Additionally, it can load modules from Puppet Forge, where IT operators, security analysts and developers share ready-to-automate solutions as Bolt tasks. These capabilities enable IT ops to take action to remediate a vulnerability without leaving the application or having to use a command-line interface or write scripts and without requiring any agent technology.

Additionally, according to Puppet, its channel partners help provide an established infrastructure and information security practice.

Security continues to be an important area of improvement for organizations. As more devices are connected through IoT, more vulnerabilities are exposed to those with malicious intent. In July, SafeBreach launched its newest version of the GRID platform in an effort to help security teams prioritize and manage security gaps.

Risk-based prioritization has been identified as a cost-effective way to reach security goals, as it identifies the most critical and immediate risks to an organization and then treats them. This enables organizations to use their security budgets in an effective way while still providing critical security.

Dig Deeper on Threat detection and response

Enterprise Desktop
Cloud Computing