Focus on the vulnerabilities with the biggest potential impact

Resolver’s Threat and Vulnerability Management Software can help you provide this education to your board and C-Suite using customized risk scoring algorithms and powerful dashboards to show your remediation efforts. We do all of this out-of-the-box.


Visualize your risks with Resolver’s multi-attribute risk scoring

Weight your risks based on business priorities, internal and external threat exploits, and vulnerability impacts. Visualize your cyber risk posture.


Help your IT Team prioritize vulnerabilities

Resolver’s automated ticketing capabilities can group vulnerabilities based on asset criticality, compliance regulations, vendors, SLA commitments, or other variables that are important to your organization.


Close the risk management loop with mitigation verification

After patching vulnerabilities, Resolver re-scores your risks to verify whether the actions you
took were truly effective in protecting your organization from threats.


See the complete picture of your risk management efforts

Real-time data, trend reports and customizable dashboards provide clear visibility into your entire risk management process. Easily share these with your C-Suite, board members, and
other stakeholders to enhance their trust in your mitigation efforts.

Scalability For The Largest, Most Complex IT Infrastructures

Resolver’s Threat and Vulnerability Management Software can manage on the scale of tens of thousands to millions of IT assets including servers, workstations, laptops, network and Internet of Things (IoT) devices with the scalability to update their status in near real-time. Even the largest organizations can have accurate, up to date status of their IT risk.

An Integrated View Of All The Information You Need

With Resolver Threat and Vulnerability Management solution, IT teams can access all of the data they need from many sources including configuration management databases (CMDB), configuration and patch management tools, data loss prevention systems (DLP), event and incident management systems (SIEMs), ticketing and service manage systems, and vulnerability scanners. This data is critical to provide a contextualized view of risks for the myriad of assets within a typical IT infrastructure.

Automate Threat and Vulnerability Management Related Tasks

Managing 10,000 and more assets is impossible to do on an asset-by-asset basis. Risk managers need to automate many tasks, such as importing assets, assigning these assets to the proper owners, updating key asset attributes, retiring assets, creating assessments, propagating asset criticality values and control results, and many other tasks.

Threat & Vulnerability Management Software For Your Entire Team

Asset classification

Classify your assets based on criticality to the business and tag assets for higher priority (e.g. contains PCI data, in DMZ, contains intellectual property)

Remediation verification

Close the risk management loop by reviewing the risk scores of your vulnerabilities after they’ve been patched to make sure your efforts were effective.

Advanced reporting

Constantly monitor your risks with visualized dashboards and share them across business units, geographies, etc.

Fast, automated collection of data

Get your threat data integrated to Resolver. Integrate your technologies (i.e. vulnerability scanners, SIEMs, CMDBs, threat feeds) with Resolver to collect and correlate all data in one centralized location. With 40+ connectors out-of-the-box, you can correlate millions of assets and 10x that number of vulnerabilities. See full list of integrations and connectors.

Ticketing and verification for quick response

Remediate quickly, prioritize and group vulnerabilities based on configurable criteria including criticality, compliance regulations, vendors, SLAs or more. Close the loop by verifying actions and aging. We’ll even rescore the risk for you automatically.

Leading Business Intelligence Capabilities

Resolver’s is packaged with JasperReports Server, a leading BI tool, deeply integrated. This deep integration with JasperReports Server ensures that users can create desired reports using all of the data that available in Resolver.

Systems Modeling

Resolver supports modeling virtually any IT infrastructure. Resolver provides an entity object that can represent a network, an entire system, an application, a server, data, or any other IT, business, or information object.

Out-of-the-box support for multiple risk frameworks

Resolver supports methodologies including ISO 27001, NIST 800-53, NIST Cybersecurity Framework, PCI DSS 3.2, and COBIT 5.

Closed-loop process

Manage risks through a closed–loop lifecycle of identification, assessment, remediation, and monitoring.

Built-in incident management

Track responses and exceptions for IT risk management approvals, reviews, and trends.


Request a Demo

Fill out this form and we will contact you shortly.