LinuxLink Login   |   1.866.392.4897 |   sales@timesys.com        English Japanese German French Korean Chinese (Simplified) Chinese (Traditional)

Compare Vigiles Security Monitoring & Management Versions — Get Answers to Frequently Asked Questions

Compare Vigiles Versions


FREE

Free, basic version providing
CVE monitoring for a single component list

PLUS

The Free version’s CVE monitoring upgraded to unlimited component lists, plus collaboration tools for CVE triage and mitigation, advanced filtering, detailed notifications, and advanced reporting tools.

PRIME

All features of Free and Plus, along with unique Patch Notification & Management features, links to Linux kernel patches based on identified CVEs, advanced CVE filtering, and fixed version notifications for OSS


Duration/Term

Free

Yearly subscription

Yearly subscription


CVEs affecting your software components

List of the Common Vulnerabilities & Exposures (CVEs) specific to your software components in your loaded manifest

Detailed

Detailed

Detailed


Push notifications of vulnerabilities

Notification of new CVEs that are associated with the software components in your loaded manifest

Summary

Detailed

Detailed


Track multiple Software Bill of Materials (BOMs)/manifests

Ability to load product manifests listing your software components and versions

Limited to 1

Unlimited per product family

Unlimited per product family


On-demand CVE report generation via Web

Notifications of vulnerabilities available on-demand in multiple formats


On-demand CVE report generation via command line

Notifications of vulnerabilities available on-demand in multiple formats

Summary

Detailed

Detailed


CVE summary by severity, status, and software package

View summary counts of Common Vulnerabilities & Exposures by the severity score derived by the Common Vulnerability Scoring System as listed in the National Vulnerability Database (NVD) maintained by the US Government’s National Institute of Standards and Technology. Also includes ability to view CVEs by the status of resolution in your manifest and by those specific to your software components.


Build system support: Yocto, Buildroot, and Timesys Factory

Ability to upload Yocto manifest (generated by meta-timeys), Buildroot manifest.csv, or Factory workorder from command-line and web for CVE scanning


Upload your Software BOM or create one using Web wizard

Upload open source component lists used by applications and BSPs for CVE scanning. Also includes ability to create custom software component lists in order to generate a CVE report and receive security notifications independently of any build engine.


Software License information (Yocto and Buildroot only)

View summary of CVEs and license stats for each package.


Filter based on Component or Status

Filter CVEs by those specific to your software components or by the status of resolution in your manifest.


CVE search tool for Timesys curated CVE database

Ability to search for CVEs by package name and version, or by ID


CVE report history with CVE trend plot

View previously generated reports and track how threats in your build have changed over time


CVE report sharing

Share a view-only version of the latest CVE report via a link. This is particularly useful when you want to quickly share a report with others who might not be on the same team.


Early CVE notification

Notification of newly discovered CVEs that are not yet in the NVD data base

 


Team sharing and CVE mitigation collaboration tools

Vulnerability management workspace and tools for you and your team members to comment, annotate, and collaborate on triage and mitigation of each vulnerability listed in your manifests.

 


Continuously track specific issues and CVE status changes

Continuous tracking of vulnerabilities based on resolution status for your manifests.

 


Whitelist already reviewed CVEs to streamline reviews

Ability to hide CVEs that are already being addressed so as to simplify reports, collaboration and mitigation

 


Filter reports by severity (CVSS) score or attack vector

Filter Common Vulnerabilities & Exposures by the severity score derived by the Common Vulnerability Scoring System as listed in the National Vulnerability Database (NVD) maintained by the US Government’s National Institute of Standards and Technology or by the technique by means of which unauthorized access can be gained to a device or a network. Also includes ability to view CVEs by the status of resolution in your manifest.

 


Software BOM/Manifest editor and revision management

Add packages, modify package names or versions for Buildroot, CSV, and Yocto SBOMs/manifests, and modify licenses for Buildroot and Yocto SBOMs/manifests. Saving creates new SBOM/manifest in the same product as the previous version with the changes applied.

 


Download reports in different formats

Ability to export reports in a variety of formats

 


Comparison of changes between builds/releases (SBOM/manifest difference)

Quickly generate reports and bulletins to document security issues and vulnerability status on releases for submission to customers and regulatory authorities.

 


Comparison of reports for new and changed CVEs

Comparison of any two scans to view new, removed, and status changed CVEs

 


Custom vulnerability score/prioritization and filtering

Assign a custom severity or priority value to each CVE (0.0 to 10.0). Sort and filter based on the custom score, and easily prioritize CVEs based on custom metrics.

 

 


Reference links to available patches, mitigation, and exploits

Links to the available patch, workarounds for mitigation when a patch is not available, and for recreating the CVE exploit for testing.

 

 


Link to mainline kernel fix commit for Linux kernel CVEs

A direct link to the CVE fix in the mainline kernel

 

 


Minimum kernel version with a fix for a kernel CVE

Identification of the minimum version of a kernel with the CVE fix

 

 


Filter reports based on kernel and U-Boot configuration

Ability to filter vulnerabilities based on the kernel configuration and U-Boot configuration in your loaded product manifest

 

 


Suggested fix for OSS CVE remediation

Identifies a version of software where the CVE is fixed and/or provides links to user space patches where available

 

 

Frequently Asked Questions (FAQs)


What is the difference between Vigiles Free, Plus and Prime?

Vigiles Free is the free, basic version and provides you with vulnerability monitoring and summary reports for 1 of your product manifests (software inventory that you load in Vigiles).

Vigiles Plus provides vulnerability monitoring and more detailed reports for an unlimited number of product manifests in a single product family, along with collaboration and communication tools to enable your team to analyze and work on mitigation for vulnerabilities.

Vigiles Prime provides all vulnerability identification and collaboration tools and expands the security management scope to include our unique Patch Notification & Management features, identifying patches and minimum versions to secure the software components that are identified in your manifests.


How does Patch Notification & Management in Vigiles Prime help with vulnerability management?

By identifying patches and minimum fixed versions, the patch management features of Vigiles Prime slash the amount of time your team spends on investigating identified vulnerabilities and exploring the mitigation steps to fix them.

Without Vigiles Prime patch management, your triage and mitigation activities will include identifying each component supplier and researching which version of a component has an available fix for a given vulnerability, if one is even available.

In contrast, Vigiles Prime patch management will automatically notify you of a patch associated with a given vulnerability for your specific components. Vigiles Prime will give you a direct link to the download for the patch. Further, Vigiles Prime will provide you with details on the minimum versions of libraries or packages and kernels that address the identified vulnerability.

Our analysis shows that Vigiles can cut your vulnerability identification and mitigation process cycles by 90 percent when compared with manual detection, investigation, and mitigation.


What are Triage Collaboration and Mitigation Tools in Plus and Prime?

These tools enable you and your team members to annotate, comment on, whitelist and otherwise collaborate on the vulnerabilities identified in your loaded product manifests. These communications tools are the foundation of highly efficient security vulnerability management workflows and risk mitigation processes.

For example, a team assigned to review a set of vulnerabilities might assign some team members to conduct impact analysis. Those team members can communicate quickly and easily about their evaluation of the security risks posed by specific vulnerabilities.

Other members may focus on high severity vulnerabilities to investigate expedited mitigation options, sharing their findings to weigh options and accelerate the response and fix.

Throughout these processes, some vulnerabilities may be whitelisted, which means they are tagged as acknowledged and in process or fixed. That way they do not clutter up the broader evaluation of inbound vulnerabilities or the mitigation workflows.

Along with flexible filtering, dashboarding, and reporting features, these collaboration tools can significantly cut the time your team spends on understanding the impact of a vulnerability and fixing it.


How do I upgrade to Plus or Prime?

Just click here to upgrade at any time.


What is a product manifest?

A product manifest is the inventory of your product’s software components and the versions in your design, loaded into Vigiles for security monitoring.


What information is collected when I upload my product manifest for security monitoring?

Timesys Vigiles only collects package/recipe names, version, patches applied (if any), and build system version information. This information will only be shared with members of your team.

Timesys Vigiles does not require you to upload your product source code.


What does Timesys do with the information in my confidential product software manifest?

We currently don’t do anything with the customer information uploaded to Vigiles. Your product manifest(s) will remain in your Vigiles account for as long as you need.

When no longer needed, you can delete the information you’ve uploaded yourself or ask us to delete it for you.


What security measures has Timesys implemented to ensure my product software manifest does not get shared with other Vigiles users?

By default, all CVE links are private and are not accessible to other users based on login authentication.


What assurances can Timesys provide that my product software manifest information will not be hacked or otherwise leaked from Vigiles?

Timesys stores all manifest information in an encrypted disk.


Do I need to manually load my product manifest each time a report is generated?

Vigiles does not require you to upload the product manifest each time it is run. In a typical Yocto build
environment, the Vigiles Yocto layer will extract the manifest from your source code.