Revolutionizing Vulnerability Management with VEX
Learn how VEX (Vulnerability Exploitability eXchange) revolutionizes vulnerability management, and how Replicated is leveraging it to offer a standardized and automated approach to efficiently address vulnerabilities.
Using Security as a Catalyst to Improve Application Adoption Metrics
Replicated recently announced new version adoption reporting. If your software adoption metrics signal challenges with your enterprise customers taking on recent software updates, consider using security as an enabler.
Secure Everything Everywhere All at Once
Security requires a comprehensive approach to be successful, and Replicated helps security-conscious vendors and enterprises meet their goals. We can think of 1/ security strategy for the enterprise who wants control of their data and the apps they use, 2/ security approaches used by the vendor building the app, and 3/ security by design that’s embedded within Replicated to facilitate both. This blog will explore the many layers of security that are necessary to protect apps and data in customer-controlled environments – everything, everywhere, all at once.
How to validate the SBOMs on Replicated Releases
A software bill of materials (SBOM) is a list of components that make up a software product. Most all software products use a combination of open-source and commercial software components from third-party vendors. Because each element has potential security implications, awareness of these sometimes hidden components is critical to understanding any software's current and future cybersecurity vulnerabilities. Replicated has been delivering SBOMs alongside every KOTS, kURL, and Troubleshoot release for some time now. We have recently updated our documentation and processes to make it easier to validate SBOMs on releases.
Replicated Completes SOC 2 Type 2 Audit
Replicated today announced the successful completion of our System and Organization Controls (SOC) 2 Type 2 attestation for security and confidentiality. This achievement reflects the company’s commitment to cybersecurity.
Slashing your Attack Surface by Reining in Your SaaS Data Sprawl
If you’re like most people, you probably didn’t hear about this recent breach experienced by Reddit. The attack was small in terms of sheer scale, but is notable nonetheless: It highlights some of the vulnerabilities of the SaaS model, where companies are encouraged to trust sensitive customer data with third parties that bear no real […]
Bypass TLS Security Warning Instructions
Replicated now serves a static page over HTTP on port 8800 to provide browser specific instructions for bypassing TLS warnings about the self-signed certs used to bootstrap the server. Specifically, Chrome, Firefox, Internet Explorer and Safari are detected with bypass instructions.