Solution scoops top prize in the independent Cyber Security Awards
Positive Technologies, a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection, has received an accolade for its MaxPatrol solution. Crowned Vulnerability Management Product of the Year in the Cyber Security Awards, organized by Tatius, MaxPatrol is an all-in-one vulnerability management solution trusted by global enterprises to maintain security and compliance.
"It’s always rewarding to have our solutions recognized over and above our competitors. As you’d expect, at Positive Technologies, we think MaxPatrol is second to none, so having external validation is always welcome," said Daniel Tara, VP of Sales at Positive Technologies. "Hackers will try many different and sophisticated ways to attack applications, databases, networks, and operating systems. However, one thing all their techniques have in common is they will focus on exploiting vulnerabilities and misconfigured system settings. We offer organizations a smarter approach to vulnerability and compliance management to find the hidden weaknesses across all their systems, and take control of their SAP and critical infrastructure security."
The Cyber Security Awards were established in 2014, to reward the best individuals, teams, and companies within the cyber security industry with excellence and innovation core themes throughout all categories. The Cyber Security Awards has 10 expert judges, who represent a broad spectrum of different backgrounds and organizations within the cyber security industry. As a totally independent event (it has no affiliation to any magazines, organizations, or products), its judges make all decisions based on merit alone. MaxPatrol was reviewed by the panel who collectively awarded it the accolade of Vulnerability Management Product of the year.
Companies worldwide rely on MaxPatrol to secure their IT and critical infrastructure with clients ranging from global enterprises to government agencies, international banks, and major telecommunications companies. The solution provides agentless, low-privileged black-box and white-box identification of vulnerabilities and configuration defects within applications, databases, network and operating systems. Its unique capabilities cover ERP (SAP), ICS/SCADA, core telecom and banking systems.