Get this blog as an RSS Feed

Secunia CSI 4.1 - enhanced reporting, new features, and integration with Secunia PSI

19:15 CET, 1st September 2010 By Jakob Balle.

The Secunia CSI 4.1 is available for immediately download for existing Secunia CSI 4.0 customers. If you're not yet a customer you can request a trial account.

Below we've highlighted some of the improvements you will find in the 4.1 release.

Secunia CSI and Secunia PSI Integration
The Secunia CSI now integrates with the Secunia PSI. The integration enables you to create a custom Secunia PSI installer that will automatically configure the Secunia PSI installation to post data to your Secunia CSI account.

Effectively allowing you to monitor and track the security and patch level of computers that are not directly under your control and where the local user has administrative privileges.

Furthermore, with the release of the new Secunia PSI 2.0, you don't "just" get results from the most accurate scan engine, you also get a user friendly interface that can be used by non-technical users, and last, but not least, you also get “Automatic-Updates”, which is configured to automatically patch and ensure that the client PC's have the latest security patches installed.

More information about the Secunia CSI/PSI integration can be found in this PDF.

Scheduled Report Generation
All reports can now be scheduled for generation at an interval configured by you and sent via email to addresses of your choice.

This can be used for setting up reports that are automatically generated and emailed to you, management, auditors, etc. based on your preferences and company requirements / policies.

Additional Report
A new "Executive Summary" report has been implemented, which quickly gives you a complete summary on the security state of the hosts that are scanned with your Secunia CSI, furthermore, it provides intelligence on historic data, for example on how many vulnerabilities or patch events the programs deployed on your network have suffered over the duration of the last three years.

Deployment of the CSI Agent Scan Engine using the WSUS / SCCM integration
Get full value of your solution in a few clicks. You're no longer limited to deploy security patches using the Secunia CSI's integration with WSUS and SCCM, you can also use it to deploy your “CSI Agents” to computers in your network.

Improved Dashboard
Many new and improved views have been added to the internal dashboard in your Secunia CSI. Most of the views focus on the current state of your programs, hosts, and sites across your network  compared to data from e.g. 1 or more weeks ago, thus enabling you to quickly and easily assess if patching on your network is on a positive or negative trend.

Furthermore, each Dashboard Profile that you configure comes with a URL which allows you to "export" the Dashboard Profile to your browser of choice, thus enabling you to view it on the IT departments info screens or the company "war room".

Download and Install
We hope you will enjoy the new release and the features it offer. As usual, please keep sending us your great feedback, suggestions, and ideas, it is what helps us improve our products and services to you.


Patch & Stay Secure,

Jakob Balle, Secunia
VP of Product Development

Discuss this blog entry
A new thread in our forum is created. Activate the thread by commenting/discussing below.

Subject: Secunia CSI 4.1 - enhanced reporting, new features, and integration with Secunia PSI

User Message

Leif Vraa

RE: Secunia CSI 4.1 - enhanced reporting, new features, and integration with Secunia PSI
This reply has been deleted
jasperwillem RE: Secunia CSI 4.1 - enhanced reporting, new features, and integration with Secunia PSI
Member 22nd Dec, 2010 16:43
Score: 0
Posts: 1
User Since: 12th Jan 2008
System Score: N/A
Location: N/A
Last edited on 22nd Dec, 2010 16:43
Hey all, why do I get a red cross for the Secunia CSI Integration when I am a personal user, its very annoying, since it suggests something is not secure.
Was this reply relevant?

You must be logged in to post a comment.