Software Vulnerability Management Blog

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Software Vulnerability Management Blog

Software Suggestion Guidelines

3 0 156
This article aims to articulate acceptance criteria for submitting software to be covered by SVR and SVM, as well as the rationale behind such. It is important to note that our Research team validates vulnerabilities, and this means it is necessary t...
by Moderator bkelly Moderator

SVM Inventory-Based Vulnerability Assessment

5 0 256
The actionable SVM’s vulnerability assessment results are achieved by performing a file-level scan against special criteria we have identified (referred to as a file signature). This capability provides definitive, actionable insights about the vulne...
by Level 7 Flexeran kmantagi Level 7 Flexeran

Flexera SVM and Microsoft Internet Explorer EoSL

2 2 680
SVM performs many features not permitted by web browsers, so leverages an ActiveX control to accomplish these tasks (like patch publishing, remote scan, and software suggestions). We recently launched a new browser-agnostic user interface at svm.flexera.com...
by Moderator bkelly Moderator