Beyond-Security Now CVE Compatible

Share Article

Beyond-IP delivers vendor-neutral framework for describing security vulnerabilities

Beyond Security ( announced their Security Assessment Service is now CVE-compatible.

Beyond-IP (, the North American distributor for BeyondSecurity will be promoting CVE-compatibility in the United States.

CVE stands for Common Vulnerabilities and Exposures. CVE is the standard for information security vulnerability names. CVE is a list of standardized names for network security vulnerabilities and other information security exposures. The goal of CVE is to provide a common language for describing computer security vulnerabilities.

"CVE-compatible" means that a product or service uses CVE names in a way that allows it to cross-link with other repositories that also use CVE names. Specific requirements for CVE Compatible products are available at the CVE website:

According to Brandon Buhai, COO of Beyond-IP, “CVE's common names make it easier to share data across separate network security databases and tools that are CVE-compatible. CVE also provides a baseline for evaluating the coverage of an organization's security tools.

CVE entries are included in the SANS/FBI "Twenty Most Critical Internet Security Vulnerabilities" consensus list, helping system administrators who use CVE-compatible products and services make their networks more secure.

To date, 136 organizations from industry, government, and academia worldwide have declared that 216 network security products or services are or will be CVE-compatible.

“CVE compatibility may seem awfully techy to some, but we feel it is important to embrace the evolving standards necessary to better audit networks security vulnerabilities,” concluded Buhai.

About Beyond-IP

For large organizations concerned about regulatory compliance or dissatisfied with the network security audit services provided by their consulting firms, Beyond-IP provides an Automated Vulnerability Management Appliance that provides a higher quality, lower cost network vulnerability assessment and management than any other alternative. The Automated Vulnerability Management Appliances performs a security mapping of your network and simulates attacks originating from either the internal or the external network. Once the security mapping is complete, the software generates a detailed vulnerability report specifying the security breaches, along with practical solutions to fix those vulnerabilities. Beyond-IP is the US arm of Beyond Security LTD.

To learn more, visit

About Beyond Security

Beyond Security is a leading provider of security assessment technologies. Beyond Security specializes in developing solutions for network security, providing detection and prevention tools. Solutions include internal network, external network and product security audits.

Beyond Security owns and administers the world’s largest independent security portal -- This portal gives security professionals from around the world critical information on new security threats and vulnerabilities, and it provides background data, fixes, patches and workarounds to identified threats, 24 hours a day, 365 day a year, making it one of the most comprehensive security resources in the world. SecuriTeam currently receives over one million unique page impressions per month from security professionals worldwide and it contains over 6,500 pages of linked. To learn more, visit


Ben Bradley



Share article on social media or email:

View article via:

Pdf Print

Contact Author

Ben Bradley