Skip to content
English
  • There are no suggestions because the search field is empty.

How Does Edgescan Remediation Priority Work?

Edgescan’s AI Insights includes a Top Vulnerabilities by Severity report, which highlights the most critical issues across your environment in a normalized, deduplicated format. This function acts as a priority hitlist, allowing security teams to focus remediation on the vulnerabilities that represent the greatest risk to the organization.

Version Number: v1.0.0

Published Date: 10 Sept 2025

____________________________________________________________________________

How It Works

  1. Data Collection
    Vulnerability data is gathered from across your estate, covering applications, APIs, cloud, and network assets.

  2. Normalization
    Variants of the same vulnerability type (e.g., Blind SQL Injection, PostgreSQL SQL Injection) are grouped under a single normalized pattern.

  3. Deduplication
    Duplicates are removed, ensuring that only the earliest occurrence of each unique vulnerability per asset is preserved.

  4. Prioritization
    Vulnerabilities are ranked by severity and impact, producing a concise Top 10 (or more) list of the issues that should be remediated first.

  5. Asset Correlation
    Each vulnerability is tied directly to the affected asset, with supporting references to CVEs and CWEs where applicable.

Benefits

  • Focused Remediation: Teams know exactly which vulnerabilities to fix first, reducing wasted effort on lower-risk issues.

  • Noise Reduction: Deduplication eliminates repeated findings, leaving only actionable, high-priority vulnerabilities.

  • Clarity Across Assets: Normalization shows systemic issues across multiple systems, such as recurring SQL injection or XSS.

  • Time Efficiency: Reduces analysis overhead by surfacing a ready-made hitlist from complex scan data.

  • Business Alignment: Simplifies reporting for leadership by showing the clearest path to risk reduction.

Use Cases

  • Remediation Planning: Direct patching and mitigation efforts to the most severe and widespread vulnerabilities.

  • Executive Risk Reporting: Communicate the “Top 10” vulnerabilities in a way that is both technically accurate and business-relevant.

  • Trend Analysis: Identify recurring vulnerability classes (e.g., SQL injection, XSS) that signal deeper process or control gaps.

  • Operational Efficiency: Integrate the prioritized list into ticketing systems (e.g., Jira, ServiceNow) for streamlined remediation workflows.

  • Continuous Risk Reduction: Use the updated hitlist as part of ongoing vulnerability management cycles to ensure resources are focused where they matter most.