Monitor IT security vulnerabilities

Simple tool for efficient collection and assessment of security vulnerabilities. 


Start Now

Please note CVE Radar is still in pre-alpha state so many bugs, unfinished features, strange behaviour or look will be experienced.​


 Why CVE Radar exists

Support vulnerability monitoring process

Reduce manual work and speedup patching

Compliance evidence simplification

"Designed by security administrators who did not want to end up in a psychiatric hospital while performing routine manual work or die of old age while waiting for information about security vulnerabilities from commonly available sources and tools."

— Jakub Morávek & František Novák —

CVE Radar creators

 Why to monitor

More than 160.000 vulnerabilities reported since 2005

More than 130.000 vulnerabilities reported in previous 5 years

More than 660.000 vulnerable SW and HW products

More than 300 vulnerabilities reported weekly during last months

Impacts of cyberattack

on organization: 

  • Financial losses
  • Interruption of operation - loss of productivity
  • Damaged reputation and loss of trust
  • Legal liability and liability for leaked data and related damages
  • Problems with securing and restoring business continuity
Marketing

Features

Fast search

Simple and fast creation of granular filters based on HW & SW that is used in company’s environment.

Audit trails

Logs from management activities in CVE monitor. Logs and reports from operation activities

API

Option to send queries directly from own systems.

Vulnerabilities evaluation

Marking vulnerabilities as relevant. Defining own severity.

Exports, Notifications and Reports

Exporting lists of vulnerabilities or vulnerability details. Schedule notifications based on vulnerability severity for different types of HW & SW and send them to different recipients.

Advantages 

Database of Vulnerabilities

CVE Radar is database of information security vulnerabilities with ergonomic web user interface for quick and easy identification of security risks that may affect your personal or work equipment.

Thousands of SW and HW products

And a great CVE Radar's database covers wide range or devices and IT applications you use wear, drive, use at home, in your work, while communicating with government offices and all other activities of your every day. subtitle

Easy to use

CVE Radar simplifies life of security specialists during daily operations or consulting missions.

Open Data

CVE Radar uses data from publicly available sources, mainly National Vulnerability Database at nvd.nist.gov.

 Typical usage workflows

Define roles

Identify

assets

Define

notification

rules

Monitor, analyse, evaluate

Send  notifications and reports

Generate  process records