Saturday, April 4, 2026

SmartFabric RocketWorx

 





Rocketgraph ThreatWorx (often referred to as Rocketworx ) is a specialized integration that combines the high-speed graph analytics of Rocketgraph xGT with the proactive vulnerability management of ThreatWorx .

Its primary function is to transform a static list of security vulnerabilities into a dynamic, navigable map of business risk .


1. The Core Functionality: “Contextual Risk”

Traditional security tools give you a "laundry list" of thousands of vulnerabilities (CVEs).Rocketgraph ThreatWorx changes this by mapping those vulnerabilities onto your actual network topology.

  • Vulnerability Ingestion: ThreatWorx continuously scans your code, containers, cloud (AWS/Azure/GCP), and endpoints to find "holes."

  • Graph Mapping: Rocketgraph takes that data and links it to your business assets (databases, servers, user identities).

  • The Result: Instead of seeing "Server A has a bug," you see "Server A has a bug, is connected to the internet, and has a direct path to the Payments Database."


2. Key Operational Features

Attack Path Analysis (The "Blast Radius")

Using Rocketgraph's parallel Breadth-First Search (BFS), the system can instantly calculate the "blast radius" of a threat.It identifies every possible route an attacker could take once they compromise a single node. On IBM Power hardware, this traversal can happen 2.5x faster than on standard x86 servers, allowing for real-time defense.

Intelligent Noise Reduction

One of the biggest problems in security is "alert fatigue." Rocketgraph ThreatWorx uses environmental context to prioritize:

  • High Priority: A vulnerability on an internet-facing asset with a path to "Crown Jewel" data.

  • Low Priority: A critical vulnerability on a server that is air-gapped or has no path to sensitive data.

Closed-Loop Remediation

Unlike tools that just report problems, ThreatWorx provides active remediation . It generates AI-validated code fixes or infrastructure scripts (patches) that can be deployed immediately to "close the hole."

Toxic Combinations

The system looks for "Toxic Combinations" that traditional tools miss, such as:

Asset A has a Vulnerability + Asset A has Admin Privileges + Asset A is Internet Exposed.


3. The “Person, Password, Purpose” Integration

When combined with Equitus.ai ArcXOS , this functionality extends into a Zero Trust architecture:

  1. Person: Verified via Equitus ICAM.

  2. Password: Verified for safety by ThreatWorx (ensuring credentials aren't leaked).

  3. Purpose: Verified by Rocketgraph xGT (ensuring the user's path and intent align with historical norms).


Summary of Value



Feature

Traditional Tools

Rocketgraph ThreatWorx

Visibility

List of CVEs

Visual Attack Paths

Speed

Minutes/Hours to scan

Milliseconds (on IBM Power)

Context

"This server is broken"

“This server exposes your Bank Ledger”

Action

Alerts only

AI-Generated Remediation Scripts




No comments:

Post a Comment

Network EYE as a two-layer enterprise solution:

“Equitus understands enterprise context; Cyberspatial sees enterprise traffic.” As a network enterprise IT Team creating a more efficient so...