Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Vulcan Cyber

Vulcan Cyber has developed the industry's first vulnerability remediation platform, built to help cybersecurity and IT operations teams collaboratively secure digital business. The Vulcan SaaS platform closes the gap between detection and remediation to reduce vulnerability dwell time and associated business risk. Vulcan Cyber orchestrates the full remediation lifecycle from identifying and prioritizing vulnerabilities to curating and delivering the best remedies, to automating processes and fixes through the last mile of remediation. It's unique ability to "get fix done" has garnered Vulcan Cyber recognition as a 2019 Gartner Cool Vendor and an RSAC Innovation Sandbox 2020 finalist. Based in Tel Aviv and San Francisco, Vulcan Cyber is privately funded by cybersecurity specialists YL Ventures and TenEleven Ventures.

Our Website:

Latest Content From Vulcan Cyber

E-Book: The Vulnerability Remediation Maturity Model

by Vulcan CyberAug 13, 2020

Scanning vulnerabilities won't protect your digital infrastructure from exploit. Digital business needs end-to-end vulnerability remediation delivered by mature vulnerability management programs.

Get "The Vulnerability Remediation Maturity Model" eBook and learn:

  • The four stages of vulnerability remediation maturity.
  • If your peers' perception of vulnerability remediation maturity attainment aligns with the reality.
  • How to improve your vulnerability management program from any stage of maturity.
  • How to move from reactive, inefficient vulnerability management to proactive, agile vulnerability remediation that scales.

Whitepaper: The Missing Pieces You Need to Automate Vulnerability Remediation

by Vulcan CyberAug 13, 2020

Vulnerability remediation at scale isn't possible without cross-functional team collaboration and shared automation. Are your existing people and tools being used to their fullest extent to efficiently protect your critical business operations?

Download "Automating Your Vulnerability Remediation Process" and get these elusive, missing pieces:

  • Free resources for vulnerability risk and exploit identification.
  • Vulnerability remedies and solutions relevant to your unique infrastructure.
  • Time-saving code snippets and scripts for automating vulnerability remediation.

Whitepaper: The Top 5 Mistakes Everyone is Making in Vulnerability Remediation

by Vulcan CyberAug 13, 2020

In vulnerability remediation, one size definitely does not fit all. Avoid making these five common mistakes and choose the right approach for your digital business.

Read this whitepaper to avoid making the same mistakes:

  • Don't prioritize vulnerabilities based on outside risk intelligence alone.
  • Automate the most mundane and repetitive remediation tasks.
  • Don't let blind spots go unchecked.

Whitepaper: Data-Driven Vulnerability Remediation with Vulcan Cyber - A Case Study With Snowflake

by Vulcan CyberAug 13, 2020

Data-driven vulnerability remediation seems next level, but Snowflake is doing it today using Vulcan Cyber remediation orchestration.

Read this Vulcan Cyber case study and learn how Snowflake gets fix done:

  • How to secure data at enterprise a service.
  • How to let the data drive a vulnerability remediation program.
  • Why a universal vulnerability remediation translator is needed to keep security and IT teams on the same page.
  • Why Vulcan was selected to help Snowflake move from vulnerability management to vulnerability remediation.

Whitepaper: The Best Free Vulnerability Management Tools

by Vulcan CyberAug 13, 2020

With so many new vulnerabilities to manage and fix, and an almost equally large number of vulnerability management tools available to security and IT operations teams, important, actionable remediation intelligence often gets lost in the fray.

Read this whitepaper to learn:

  • Which free, open source tools can provide value to your vulnerability management program?
  • When open source tools can effectively replace expensive, commercial alternatives.
  • How to identify the right database for vulnerability intelligence.