Skip to content

Product Information

Price

Contact us

MSRP

-

V2D Part # / MFR Part #

24341810 / -

Manufacturer

Vicarius

License Type

Software Licenses

vRx protects your installed operating systems and third-party software from vulnerabilities.

Consolidate your software vulnerability assessment with one single vRx agent. Let vRx do the work so you can focus on and remediate the threats that matter most.

Detect CVE & Binary-Level Threats

vRx is an all-in-one vulnerability assessment and management solution, allowing you to run a real-time and network scan and analyze proprietary and niche applications for vulnerabilities. Get a dashboard that visualizes the results, and manage your entire organization’s assets from one platform for complete coverage and visibility.

Real-Time Asset Threat Analysis

vRx's Asset Threat Analysis tool analyzes active and non-active assets within your organization to determine their overall exploitation and risk level.

Real-Time App Threat Analysis

vRx's App Threat Analysis tool runs a binary analysis of third-party apps to detect common vulnerabilities, including zero-day and CVE threats.

Plug-and-play full-stack platform with faster setup and simple maintenance

With each product component connected, your organization will get a faster ROI without additional infrastructure costs. In as low as 7 minutes we can configure and deliver highly available software and hardware architecture.

Visualized Dashboard of a Full Network ScanvRx's Auto App Recognition tool detects all installed OS and apps across organizational assets and creates an inventory of their most recent versions and missing updates.

Personalized Prioritization

vRx's prioritization engine using CVSS framework bases prioritization, plus AI of the specific security posture of your organization, and maps your digital environment to help you prioritize critical vulnerabilities for mitigation.

x_tags™

vRx's x_tags™ prioritize all detected threats based on their severity using contextual scoring, first identifying the most critical threats your organization faces.

Asset Risk Scoring

vRx ranks the risk and severity of each app and asset in your organization based on their level of threat and severity.

Prioritization Mapping

vRx maps the potential consequences of a successful exploit within your unique digital infrastructure. CVSS metrics and context-based AI mapping provide the data needed to prioritize and mitigate critical vulnerabilities.

Eliminate Threats Swiftly & Safely

For each detected app, OS, or asset vulnerability, vRx provides recommended actions that help you eliminate potential risks and stay resilient.

Recommended Action Engine

vRx's Recommended Action Engine provides real-time suggestions for detected vulnerabilities, allowing you to take quick action and mitigate business risk.

Real-Time Patch Management

vRx's Real-Time Patch Management gives you the flexibility to efficiently close security gaps at a moment's notice or schedule patch installations Windows, macOS, and Linux operating systems to reduce organizational risk posture continuously.

Patchless Protection™

vRxs Patchless Protection™ tool secures high-risk apps rapidly and blocks incoming exploitation attempts using proprietary in-memory protection.

Patchless Protection

Beat the patch gap and stay protected with or without a security patch.

Keep your high-risk and vulnerable apps secure even when a patch has not been developed or deployed. If flaws are published before the vendor can fix them, attackers may be able to break into systems. With vRx’s Patchless Protection, vulnerable applications are shielded within a force field and secured until the next patch has been prepared, tested, and deployed.

Patchless Protection is a multi-layered security mechanism which, upon the configured policy, secures the executable of the vulnerable software and the related binaries. This is achieved by securing the memory space of the vulnerable software from any injection/scraping related attempts and also by securing the vulnerable functions in-memory. The in-memory protection uses state-of-the-art dynamic binary instrumentation (DBI) technology that tracks the vulnerable functions upon loading to the memory space of the vulnerable asset. Then, upon exploitation, the implemented code either notifies the admin or blocks the system call in memory (subject to configuration).

Overview

Product Information

Price

Contact us

MSRP

V2D Part # / MFR Part #

24341810 / –

Manufacturer

Vicarius

License Type

Software Licenses

vRx protects your installed operating systems and third-party software from vulnerabilities.

Consolidate your software vulnerability assessment with one single vRx agent. Let vRx do the work so you can focus on and remediate the threats that matter most.

Detect CVE & Binary-Level Threats

vRx is an all-in-one vulnerability assessment and management solution, allowing you to run a real-time and network scan and analyze proprietary and niche applications for vulnerabilities. Get a dashboard that visualizes the results, and manage your entire organization’s assets from one platform for complete coverage and visibility.

Real-Time Asset Threat Analysis

vRx’s Asset Threat Analysis tool analyzes active and non-active assets within your organization to determine their overall exploitation and risk level.

Real-Time App Threat Analysis

vRx’s App Threat Analysis tool runs a binary analysis of third-party apps to detect common vulnerabilities, including zero-day and CVE threats.

Plug-and-play full-stack platform with faster setup and simple maintenance

With each product component connected, your organization will get a faster ROI without additional infrastructure costs. In as low as 7 minutes we can configure and deliver highly available software and hardware architecture.

Visualized Dashboard of a Full Network ScanvRx’s Auto App Recognition tool detects all installed OS and apps across organizational assets and creates an inventory of their most recent versions and missing updates.

Personalized Prioritization

vRx’s prioritization engine using CVSS framework bases prioritization, plus AI of the specific security posture of your organization, and maps your digital environment to help you prioritize critical vulnerabilities for mitigation.

x_tags™

vRx’s x_tags™ prioritize all detected threats based on their severity using contextual scoring, first identifying the most critical threats your organization faces.

Asset Risk Scoring

vRx ranks the risk and severity of each app and asset in your organization based on their level of threat and severity.

Prioritization Mapping

vRx maps the potential consequences of a successful exploit within your unique digital infrastructure. CVSS metrics and context-based AI mapping provide the data needed to prioritize and mitigate critical vulnerabilities.

Eliminate Threats Swiftly & Safely

For each detected app, OS, or asset vulnerability, vRx provides recommended actions that help you eliminate potential risks and stay resilient.

Recommended Action Engine

vRx’s Recommended Action Engine provides real-time suggestions for detected vulnerabilities, allowing you to take quick action and mitigate business risk.

Real-Time Patch Management

vRx’s Real-Time Patch Management gives you the flexibility to efficiently close security gaps at a moment’s notice or schedule patch installations Windows, macOS, and Linux operating systems to reduce organizational risk posture continuously.

Patchless Protection™

vRxs Patchless Protection™ tool secures high-risk apps rapidly and blocks incoming exploitation attempts using proprietary in-memory protection.

Patchless Protection

Beat the patch gap and stay protected with or without a security patch.

Keep your high-risk and vulnerable apps secure even when a patch has not been developed or deployed. If flaws are published before the vendor can fix them, attackers may be able to break into systems. With vRx’s Patchless Protection, vulnerable applications are shielded within a force field and secured until the next patch has been prepared, tested, and deployed.

Patchless Protection is a multi-layered security mechanism which, upon the configured policy, secures the executable of the vulnerable software and the related binaries. This is achieved by securing the memory space of the vulnerable software from any injection/scraping related attempts and also by securing the vulnerable functions in-memory. The in-memory protection uses state-of-the-art dynamic binary instrumentation (DBI) technology that tracks the vulnerable functions upon loading to the memory space of the vulnerable asset. Then, upon exploitation, the implemented code either notifies the admin or blocks the system call in memory (subject to configuration).

vRx Pro Services

Insuring Against Exploitable Vulnerabilities

Service Packages

V2 Part no. Service Name Overview List Price (USD)
VRX-VRPK-143 vRx Remediation Platform Kickstart Guided assistance through the intuitive onboarding process, including agent deployment and scan configuration. Contact for Pricing
VRX-VMSW-144 Vulnerability Management Strategy Workshop A consultative workshop to help you optimize your vulnerability management strategy. Contact for Pricing
VRX-ARS-145 Automated Remediation Service The vRx platform includes embedded services like automated patching and custom remediation scripts. Included with Platform
VRX-PP-146 Patchless Protection Provides protection against vulnerabilities even when a patch is not yet available. Included with Platform
VRX-PEP-147 Partner Enablement Program A program for MSPs and resellers to build a managed vulnerability remediation service. Included with Partnership

Contact us

to explore more

Schedule a demo, start a free trial, or request a quote, and more

We are here to assist you every step of the way