0
1.0.10
Zurich, Yokohama, Xanadu
The Threat Escalation Vulnerability Analysis (TEVA) app is a custom ServiceNow solution that helps teams like Threat Intelligence, Incident Response, and Vulnerability Management work together on vulnerability tracking and remediation. It automates CVE lookups, integrates threat intelligence, and supports collaboration across Intel Ops and Security teams through a single workspace.
- Automated CVE Intelligence: Pulls data from Digital Shadows, CISA Known Exploited Vulnerabilities, CVSS scoring, third party plugins, and third-party sources.
- Automated Record Creation: Automatically generates vulnerability records when specific criteria are met—such as matching known exploited vulnerabilities (e.g., CISA KEV) or exceeding severity thresholds.
- Auto-Closure of Stale Records: Automatically closes records when no active findings are detected over a configurable period, reducing noise and maintaining a clean, actionable backlog.
- Real-Time Finding Synchronization: Continuously updates the count of associated vulnerability findings, including those identified across other instances running Vulnerability Response.
- Flexible flows: Supports escalation, de-escalation approval flows
- Automated Notifications: Notifications are triggered automatically for escalation approvals and general updates
- Role-Based Access Control (RBAC)
- TEVA Users: Create and view TEVA records with limited access.
- TEVA Managers: Access investigator-specific sections of a case.
- TEVA Admins: Full control over TEVA, configurations, and notifications and second level approvals.
- Catalog Integration: Users can submit TEVA requests directly from the Service catalog interface using CVE identifiers.
New Release
Threat Escalation Vulnerability Response is depended on the following plugin/apps:
- Vulnerability Response Dependencies
- Vulnerability Response Integration with NVD
- Vulnerability Response Integration with CISA
- GreyMatter Digital Risk Protection Vulnerability Intelligence for Vulnerability Response (previously Digital Shadows Vulnerability Intelligence for Vulnerability Response)
The third-party licensing supporting above integrations are also required.