Which scanners does Fig integrate with?
Fig normalises data from Tenable, Qualys, Rapid7, Nessus, Microsoft Defender, and others. New scanner integrations are added monthly.
How does prioritisation differ from CVSS scoring?
Fig overlays exploit intelligence and asset context on top of CVSS scores to prioritise vulnerabilities that are actively being exploited in the wild.
How does Fig handle false positives?
Fig correlates scanner output with asset context, exploit intelligence, and configuration data to reduce false positives. Findings can be marked as accepted risk with documented justification, approval chains, and scheduled review dates.
Can we set different remediation SLAs per client or severity level?
Yes. Remediation SLAs are configurable per client, asset criticality, and vulnerability severity. Fig tracks SLA compliance and escalates overdue items automatically to the assigned owner and their manager.
Do we need to rip out our existing scanners to use Fig?
No. Fig sits on top of your current scanners and normalises their output into one view. You keep running the scanners you already have, and Fig handles consolidation, prioritisation, and evidence packaging.
What is the vulnerability governance workflow?
Fig manages vulnerabilities through a 9-state lifecycle: Reported, Triaged, Remediation, Remediated, Verified, Disclosed, and Closed. Each state transition is logged with a tamper-evident audit trail. This separates Fig from tools that just show scan results.