Customer Requests

Enhance Xcitium Portal: Patch Deployment Logs and Forced Restart Option
Currently, when deploying critical patches through the Xcitium Vulnerability Manager, the portal lacks essential logs and status updates. This makes it difficult to track patch progress and verify successful installation. Additionally, there is no option to force a device restart when required by the patching process. To improve the user experience and streamline patch management, we request the following enhancements: Detailed Logging: Implement comprehensive logging within the patch management section of the portal. Logs should include real-time status updates on patch deployment, error messages if any occur, and confirmation of successful installation on each device. Forced Restart Option: Introduce a configurable option within the Vulnerability Manager to enforce a device restart when a patch requires it. This will ensure consistent and complete patch installation across all endpoints. These enhancements will address the following pain points: Lack of Visibility: Administrators currently have no way to monitor patch deployment progress or troubleshoot failed installations within the portal. Incomplete Patching: The absence of a forced restart option can lead to incomplete patching if users fail to manually restart their devices after patch deployment. Support Challenges: As indicated by the support ticket response, the lack of logs and forced restart functionality is a known limitation and hinders effective troubleshooting. By adding these features, Xcitium can significantly improve the usability and effectiveness of its patch management capabilities, ultimately enhancing endpoint security and reducing administrative overhead.
0
Comprehensive Security Review Reports for Ongoing Customer Engagement
To enhance the value Xcitium provides to its customers and MSP partners, we propose the implementation of detailed security review reports. These reports would be generated on a monthly basis for continuous monitoring and in a more comprehensive format for quarterly review meetings. The goal is to provide customers with a clear understanding of their security posture, its evolution over time, and the value delivered by Xcitium's solutions. Report Components: Executive Summary: A concise overview of the customer's security posture, key findings, and recommendations. Security Score: A numerical representation of the customer's overall security health, derived from multiple factors. Asset Inventory and Analysis: Employees, devices, IPs, domain names, and other relevant assets. Analysis of asset vulnerabilities and potential attack vectors. Threat Detection and Response: Details from Xcitium XDR, including detected threats, attempted attacks, and successful mitigations. Incident response summaries from the SOC, highlighting the effectiveness of Xcitium's interventions. Vulnerability Management: Overview of vulnerabilities discovered by Xcitium and external scans.Progress on remediation efforts and reduction of the attack surface. Cloud Security: Assessment of cloud applications and infrastructure for misconfigurations and vulnerabilities. Analysis of cloud footprint changes and potential security implications. Threat Intelligence: Identification of new unknown files, leaked credentials, and other indicators of compromise.Actions taken to mitigate threats and protect sensitive data. User and Device Posture: Evaluation of user behavior and device compliance with security policies. Identification of potential risks and opportunities for improvement. Support and Service: Summary of tickets and support interactions, highlighting the responsiveness and effectiveness of Xcitium's customer service. Data Sources: The reports would aggregate data from various Xcitium tools and services, including: Threat Hunter Assessment Tool Dark web monitoring tools Cloud footprint tools Web vulnerability scanning Xcitium XDR SOC incident logs User and device activity logs Ticketing and support systems Benefits: Enhanced Customer Communication: Provide customers with transparent and actionable insights into their security posture. Demonstrated Value: Showcase the effectiveness of Xcitium's solutions in mitigating risks and improving security. Improved Customer Retention: Build stronger relationships with customers by providing ongoing value and demonstrating a commitment to their security. Upsell Opportunities: Identify areas where additional Xcitium products or services could further enhance the customer's security posture. Additional Considerations: Customization: White label reports should Allow for tailoring of the report to the specific needs and preferences of each customer. Scheduling and Delivery: Automate report generation and delivery for both monthly and quarterly reviews. Interactive Dashboards: Supplement the reports with interactive dashboards for real-time visibility into key security metrics.
0
Load More