Nestec partner portal

All important information at your fingertips. Access the partner portal or register if you don't have an account open.

Offers, Invoices, Licenses

All important documents in one place. You can download your offers, invoices, and licenses at any time.

Online orders

You can order all your licenses directly through nestec web-SHOP.

NESTEC Partner Login

Stay registered
Blog Post Selected Article

Updates in Vulnerability Management feature for N-central and N-sight

N-able brings several enhancements to Vulnerability management in it’s latest release (preview), with a strong focus on exploit intelligence and contextual information.

Key Updates to Vulnerability Management

  • CISA Known Exploited Vulnerabilities (KEV) Indicators: Vulnerabilities are showing indicators for Known Exploits and Known Ransomware, pulling data from the CISA KEV catalog. This is the major highlight, allowing users to immediately prioritize threats that are actively being exploited in the wild.

  • Common Weakness Enumeration (CWE) Details: Detected vulnerabilities with a CWE identifier now include a link to the corresponding CWE web site (via cwe.mitre.org). This helps teams understand the root cause of the software weakness and improve long-term security.

  • Server/Workstation Role Indicator: Endpoints now display their typical OS role (Server or Workstation). This enables smarter prioritization, allowing critical vulnerabilities on servers to be addressed first.

  • Improved CVE Details Overlay: The redesigned overlay provides a direct link to the CVE webpage and detailed CVSS breakdowns, Threat Information, and Affected Assets, offering deeper context without leaving the platform.


Improved Performance and Usability

This update includes fixes aimed at increasing responsiveness, especially in large environments like:

  • Database Optimization: In a situation where multiple processes or threads are simultaneously trying to access and modify the same resource in the Asset/Vulnerability mapping view results, N-able reduced contention that resulted in faster load times.

  • Default Filtering: New default filter is focused on Critical and Important vulnerabilities, that speeds up the display of the most actionable issues.

  • Now, when you click a vulnerability link (CVE), a new window pops up (Overlay). This window gives you detailed information like a direct link to the official CVE page, full CVSS severity scores, details about the threats, and a list of all affected systems.

 

All these updates provide users with immediate visibility into exploited threats and the context needed to reduce risk to their core infrastructure.

About autor

Jurica Parsic IT Support Specialist

A seasoned professional in data backup & disaster recovery, virtualization and cybersecurity with more than 5 years of experience in this field. Working closely with global vendors, IT resellers and IT service providers to develop a deep understanding of the technologies, processes and best practices involved in ensuring security and business continuity for a wide range of organizations, from small businesses to large corporations.