Skip to main content
TrustRadius
Exodus Intelligence Vault

Exodus Intelligence Vault

Overview

What is Exodus Intelligence Vault?

The Exodus Intelligence Vault is a cybersecurity solution that aims to provide organizations with actionable information about unknown vulnerabilities that may pose a significant risk to their assets. According to the vendor, this platform focuses on discovering and exploiting vulnerabilities in business-...

Read more
Recent Reviews
TrustRadius

Leaving a review helps other professionals like you evaluate Vulnerability Management Tools

Be the first one in your network to review Exodus Intelligence Vault, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

Sorry, this product's description is unavailable

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

Alternatives Pricing

What is JupiterOne?

JupiterOne (jupiterone.com) is a software cloud-native security platform built on a graph data model, to expose the complex relationships between cyber assets.

What is Vulcan Cyber?

Vulcan Cyber is an exposure and vulnerability risk mitigation platform that coordinates teams, tools and tasks to eliminate the most-critical exposure risk to the business. Vulcan Cyber first correlates risk signals from the leading scanners, cyber asset and threat intelligence tools. Risk data…

Return to navigation

Product Details

What is Exodus Intelligence Vault?

The Exodus Intelligence Vault is a cybersecurity solution that aims to provide organizations with actionable information about unknown vulnerabilities that may pose a significant risk to their assets. According to the vendor, this platform focuses on discovering and exploiting vulnerabilities in business-critical software, such as enterprise backup solutions, browsers, and email clients. The Exodus Intelligence Vault is designed to cater to the needs of various companies, including cybersecurity professionals, IT managers and administrators, security researchers, government agencies, and financial institutions.

Key Features

Zero-Day Subscription: According to the vendor, customers gain access to unknown vulnerabilities, including zero-day vulnerabilities discovered by Exodus engineers. They receive vulnerability intelligence reports with detailed documentation and mitigation guidance for critical flaws affecting widely used software, hardware, and embedded devices. The platform provides a library of over 100 unique zero-day reports, along with Snort or Yara rules for plug-in solutions to existing products. Customers can also test their defenses with provided PCAPs and proof of concept for each report.

N-Day Vault Subscription: The vendor states that the N-Day Vault Subscription keeps customers informed about vulnerabilities publicly disclosed by outside organizations or software vendors. The platform analyzes and documents vulnerabilities that impact business-critical systems, covering a diverse set of enterprise software, hardware, common IoT, and Industrial Control Systems. Customers can access more than 1300 vetted, reliable proof-of-concepts or exploits, reports, and corresponding mitigation guidance. The subscription also includes vulnerability intelligence packages with detailed documentation, XML files for integration into third-party products, POCs or exploits, and network packet captures.

Vulnerability Intelligence Packages: According to the vendor, the Exodus Vault provides comprehensive documentation of vulnerabilities, including detailed exploit analysis and mitigation guidance. The Vulnerability Intelligence Report offers information on affected products, versions, supported architectures, and hashes of binary files. Customers gain technical insights into vulnerable components, attack vectors, disassembly or source code walkthroughs, and information on malicious network traffic. The platform also provides guidance on detecting attacks and reducing susceptibility to the flaw. Integration into third-party detection, prevention, and security integration products is made easier with XML files. Proof of concept and network packet captures are also included.

Training Courses: Exodus Intelligence offers specialized training courses, according to the vendor, to enhance customers' skills. The browser vulnerability development master class provides hands-on experience with advanced vulnerability and exploitation topics within modern browsers. The training covers areas such as reverse engineering, static and dynamic analysis, fuzzing, binary instrumentation, vulnerability triage, advanced debugging techniques, memory corruption, and mitigation bypasses. Alternatively, customers can opt for the mobile vulnerabilities and exploitation training, which focuses on the Android platform, Android OS internals, reverse engineering, and developing reliable exploits. The vendor also offers customized training courses to meet specific organizational needs, with adaptable content and duration.

Exodus Intelligence Vault Features

  • Supported: Monitoring
  • Supported: Vulnerability Assessment
  • Supported: Vulnerability Scanning

Exodus Intelligence Vault Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWeb-Based
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation