Why CVE Radar exists
Support vulnerability monitoring process
Reduce manual work and speedup patching
Compliance evidence simplification
"Designed by security administrators who did not want to end up in a psychiatric hospital while performing routine manual work or die of old age while waiting for information about security vulnerabilities from commonly available sources and tools."
— Jakub Morávek & František Novák —
CVE Radar creators
Why to monitor
More than 160.000 vulnerabilities reported since 2005
More than 130.000 vulnerabilities reported in previous 5 years
More than 660.000 vulnerable SW and HW products
More than 300 vulnerabilities reported weekly during last months
Features
Fast search
Simple and fast creation of granular filters based on HW & SW that is used in company’s environment.
Audit trails
Logs from management activities in CVE monitor. Logs and reports from operation activities
API
Option to send queries directly from own systems.
Vulnerabilities evaluation
Marking vulnerabilities as relevant. Defining own severity.
Exports, Notifications and Reports
Exporting lists of vulnerabilities or vulnerability details. Schedule notifications based on vulnerability severity for different types of HW & SW and send them to different recipients.
Advantages
Database of Vulnerabilities
CVE Radar is database of information security vulnerabilities with ergonomic web user interface for quick and easy identification of security risks that may affect your personal or work equipment.
Thousands of SW and HW products
And a great CVE Radar's database covers wide range or devices and IT applications you use wear, drive, use at home, in your work, while communicating with government offices and all other activities of your every day. subtitle
Easy to use
CVE Radar simplifies life of security specialists during daily operations or consulting missions.
Open Data
CVE Radar uses data from publicly available sources, mainly National Vulnerability Database at nvd.nist.gov.