There's no doubt that automation is one of the most powerful tools available to business owners and managers. By automating repetitive tasks, businesses can improve efficiency and quality while freeing up employees to focus on more important work. This is certainly the case with RankedRight, the platform which automates the time-consuming process of vulnerability prioritisation. By using RankedRight, teams save hours each day on manual triage, enabling them to get to critical remediation more quickly.
While one important feature of the platform is to help businesses prioritise their risk; another is the ability to assign vulnerabilities, to the appropriate person or team to resolve. In this short guide, we’ll explain how you can create users and assign them rules on the platform in order to make the process as efficient and effective as possible.
If you’re reading this article, you’re already familiar with what RankedRight does and perhaps you’re considering how well it can work for your team.
The first important point to make here is that there is no limit to the number of users you can add to your RankedRight account. This means that, crucially, every member of your team can gain access and get full visibility of the vulnerability management process which includes:
This gives everyone peace of mind that the team is always working on the most appropriate and critical tasks at any point in time and that risk is being reduced according to your business’ appetite.
So how do you create a user?
It’s really simple. Just go to the User Section, click on the button that says Create User and then add in their details. It’s really as simple as that.
Don’t believe us? Scroll down for a GIF of the process.
Once you’ve added someone as a new user to the platform, they’ll receive log in details via email and then they’re ready to get started.
Of course, if you really want to speed up the vulnerability management process, the next important step to take after creating new users is to assign them rules, as the next section will explain.
Wouldn’t it be great if your highly skilled remediation experts knew exactly what to work on as soon as they start their day? With RankedRight in place, that’s possible, provided you invest a little time on the rule-setting process. If you haven’t read it yet, we recommend checking out our overview of how to set prioritisation rules, to get an understanding of the basics.
Then, once you’ve set those rules, you can then add them to different users so that they are automatically assigned tasks.
How do you do this? Again, it’s simple. You click on the user, click on the dropdown button for Rule and then select the rule you wish to apply.
You can check out both processes below:
Once a user has been assigned rules, vulnerabilities will begin filtering through to their to do list. Then they simply log on to the platform, click on the first task, see the vulnerability intelligence gathered and start work. We’re constantly striving to provide as much information as possible to help our users either remediate their vulnerabilities or put in place a compensating control method.
If you’d like further information on how RankedRight could support your vulnerability management efforts, please get in touch or book a demo.
Find out how to effectively set the service level agreement (SLA) for vulnerability management activities. Learn about the steps that are involved when setting levels of assurance and why these metrics matter.
While some risks can be mitigated with the right precautions, others are simply impossible to avoid. That is where risk acceptance comes in and RankedRight can help.
Are your vulnerability management services as good as you think they are? Try our checklist to find out.
Give your business the opportunity to engage with clients all year round by adding vulnerability management to your portfolio.
By combining your asset management and vulnerability management efforts, you can dramatically improve your organisation’s security posture.