Microsoft Threat Vulnerability Management (TVM) as a comprehensive security solution employs a risk-based methodology to find, prioritise, and fix endpoint vulnerabilities and configuration issues. The solution is capable of reducing cyber exposure, discovering real-time vulnerabilities across the stack, prioritizing the right things with business and threat context, besides connecting security and IT. Periodic scans are obsolete now: thanks to continuous, real-time vulnerability and misconfiguration evaluation, which allows teams to repair security gaps and eliminate blind spots. Even when devices are not linked to the corporate network, built-in and agent-based sensors can detect vulnerabilities. Moreover, vulnerabilities are also prioritised based on threat intelligence, breach likelihood, and investment growth, allowing businesses to analyse the underlying threat to an organisation and decide on the best mitigation strategy faster. Coming to the remediation process, the platform reduces risk by bridging the gap between security and IT teams with a built-in remediation approach that includes appropriate mitigation alternatives like configuration adjustments.
Pricing
Platforms Supported
Organization Types Supported
API Support
Modes of Support
Free Trial
Available
Pricing Options
Premium Plans ( Quotation Based )
Pricing Plans
Microsoft TVM Custom
Features
Disclaimer: The pricing details were last updated on 18/08/2020 from the vendor website and may be different from actual. Please confirm with the vendor website before purchasing.
Learn more about Microsoft Threat Vulnerability Management Pricing.
Threat and Vulner...
Threat and Vulner...
Threat
Microsoft Defende...
TVM Dashboard
Remediation Activ...
Exceptions
TVM Exception Impact
What are the top alternatives for Microsoft Threat Vulnerability Management?
Does Microsoft Threat Vulnerability Management provide API?
Yes, Microsoft Threat Vulnerability Management provides API.
Vendor Details
Seattle, Washington StateContact Details
Not available
https://www.microsoft.com/en-us/security/business/threat-protection/threat-vulnerability-management
Social Media Handles
Not available
This research is curated from diverse authoritative sources; feel free to share your feedback at feedback@saasworthy.com
Looking for the right SaaS
We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.
Want more customers?
Our experts will research about your product and list it on SaaSworthy for FREE.