Skip to main content
  • 102 Product updates

Blast Radius - Introducing Multiple Source Types

We're excited to introduce the latest update to Blast Radius with the release of 24.2, now enabling the use of multiple source types for Blast Radius computations. In previous releases, Blast Radius was confined to computing the blast radius with a single host. With 24.2, you can now employ a variety of source types for Blast Radius computations, providing a more comprehensive analysis of network security.The ability to compute the blast radius from different source types is crucial for network security teams. It offers a deeper understanding of potential vulnerabilities and enhances effective threat mitigation strategies. In the event of a compromised host, security teams need to understand how an attacker can move laterally within the network. Blast Radius now offers a comprehensive analysis of all reachable hosts or subnets from any source location or entity in the network. This includes detailed insights into specific IP protocols, Layer 4 ports, and Layer 7 App IDs.Whether analyzing traffic flow from the Internet, a specific security zone, or a network device, Blast Radius empowers network and security professionals to evaluate the impact of compromised sources within the network. This understanding is vital for assessing security vulnerabilities and preventing potential attacks.The source types now available with 24.2 are:Device Interface Security zone Device VRF Host alias Device alias Interface alias Subnet locationScreenshot displaying reachability results of a Blast Radius searchTo get started, navigate to the Blast Radius application within the fwd.app, select your desired sources, and click Search to begin analyzing your network.For more information, please refer to the Blast Radius section within Forward Docs.

Related products:Security

Security - Vulnerability Management - CVEs Risk Scores and Publish Dates

Vulnerability Management is a cornerstone of network infrastructure security, playing a vital role in safeguarding against potential threats. Chief Information Security Officers (CISOs) recognize the critical importance of regularly assessing and addressing vulnerabilities in network devices. Identifying and remedying these vulnerabilities is essential to prevent potential exploits that could compromise the confidentiality, integrity, and availability of your network. Forward Enterprise offers a proactive Vulnerability Management functionality, empowering users to proactively address emerging threats, thereby reducing the risk of data breaches and service disruptions.The 24.1 release provides additional details into the Vulnerability page, specifically the CVE (Common Vulnerabilities and Exposures) CVSS (Common Vulnerability Scoring System) score and the CVE publish date. These enhancements further assist in prioritizing remediation efforts by providing comprehensive insights into the severity and timing of vulnerabilities.CVSS offers a qualitative measure of severity, enabling users to assess the potential impact of vulnerabilities accurately. It's important to note that while CVSS provides severity scores, it does not measure risk directly. Vulnerability Page: CVE Scores and DatesTo dive deeper into understanding CVSS scores and their implications, explore the resources available on the NIST websiteTo learn more about the Vulnerability Management application, visit the Vulnerability Analysis Documentation page

Related products:Security
Other Features
User Engagement Metrics
Path Analysis for Multicast SSM
Progressive Analysis