Network Vulnerability Manager

Q1: What is NVM?

A: NVM, Network Vulnerability Manager, is a new capability of the BackBox Network Automation Platform to provide network administrators with CVE and other vulnerability information to help understand the vulnerability state of the network and how to best remediate. NVM integrates with our Network Automation Manager into a closed loop, meaning it performs device inventory collection, uses that live-inventory to map to a threat and vulnerability feed, and then provides remediation through automation to help patch vulnerabilities.

Q2: What are the benefits of NVM?

A: NVM makes it much easier and faster to identify network vulnerabilities rather than relying on a time-consuming manual process.

It provides administrators with quantifiable information regarding the vulnerability state of the network. Using this information, administrators can prioritize OS Updates and Patches based on vulnerability status.

NVM inventory is kept up to date with each regularly scheduled backup, and as such, administrators are always presented with a current view on their vulnerability state because NVM maps that information to specific devices and configurations.

Finally, because the information ties into an automation platform, BackBox becomes the only vulnerability tool that integrates with “the fix” enabling administrators to not only know where they have vulnerability exposure, but also to fix the vulnerabilities that exist.

Q3: Can I try NVM?

A: Yes. There is a trial available. And there’s a job in BackBox to collect inventory for NVM to get started. Simply contact to have the NVM trial enabled.

Q4: Do I need IntelliChecks to run NVM?

A: Yes. The entire network needs IntelliChecks or BackBox Premium licenses (Universal or Device Specific purchases).

Q5: Can customers with perpetual licenses buy NVM?

A: Yes. NVM however is priced on subscription only.

Q6: Can customers buy NVM with standard support?

A: No. NVM licenses include premium support.

Q7: Does Premium support mean BackBox will remediate vulnerabilities?

A: No, but we will do our best to ensure there is an approach and plan for remediation and make remediation automations available as they become tested and available.

Q8: What if I don’t want NVM, can I remove the Vulnerability Management Tab from the BackBox Network Automation Manager interface?

A: Yes. Contact

Q9: What is the source of the CVE and vulnerabilities being analyzed?

A: We get CVE information from NIST, and other vulnerability information from CISA, vendor websites, industry publications, and more.

NVM's distinctiveness lies in its unmatched ability to draw security insights from multiple dependable sources. Beyond the traditional reliance on the National Vulnerability Database (NVD), NVM diligently extracts security data from vendor websites, advisories, and various other trusted vulnerability resources. This multifaceted approach ensures a comprehensive and accurate view of potential risks, providing you with a superior layer of protection.

Q10: Can we hook into other threat detectors?

A: Not today.

Q11: How is NVM data collected and shared?

A: NVM is a cloud service. The job that collects your inventory data helps you select the level of privacy you require. To onboard devices to NVM, BackBox sends the following through a secure, encrypted HTTPS connection:

  • Device Name (optional)
  • Device IP (optional)
  • BackBox Device ID
  • Device Site
  • Device Vendor
  • Device Model
  • Device OS Version
  • NVM Admin Email
  • BackBox License Key
  • Company Name

Device Name is used to identify devices in the Network Vulnerability Analyzer web console. In the absence of the Device Name, we use Backbox Device ID.

Ready to take the next step? Request a demo.