humburger-icon
menu-close

How Our Cutting-Edge New Capability Makes You More Secure and Compliant With CISA Emergency Directive 22–03.

CISA Emergency Directive 22-03 — Mitigate VMware Vulnerabilities

  • This directive was released to highlight in the wild attacks on VMware products.
  • Because these products contain remotely exploitable vulnerabilities (ie. CVE-2022-22954 and CVE-2022-22972) that can give attackers full control of VMware systems, agencies are required to either update VMware products or remove them from the network until they can do so.
  • Trinity Cyber protects Internet facing VMware servers from initial attack, using unique technology - run as a fully managed service - to stop exploits inline, before they have a chance to compromise VMware platforms.
  • Agencies can patch these systems while ensuring that Remote Code Exploits (RCEs) such as the ones called out in this directive, never reach mission-critical devices.

Learn More About Each Mandate

small-bod-22-01-v3f

CISA ED 22-03 Compliance

Trinity Cyber automatically protects against the exploitation of hundreds of vulnerabilities, including the VMware vulnerabilities for which CISA has directed mitigation

"Trinity Cyber’s profound technical breakthrough is designed expressly to 'shift the advantage to the defenders.' I and the Trinity Cyber team are delighted that the Biden Administration’s National Cybersecurity Strategy recognizes that as the core goal for our country."

Thomas P. Bossert, President at Trinity Cyber, Inc.

Worried about these mandates? We have you covered. Learn more below.