Let’s look at the vendors many enterprises rely on today: • Palo Alto Networks • Fortinet • Check Point • CrowdStrike • Zscaler I recently looked at public CVE disclosures over the last 5 years across these vendors, and the numbers surprised quite a few people. But there’s an important nuance most people miss: Architecture matters. Some of these vendors historically built their platforms around: • Hardware appliances • On-prem software • Customer-managed infrastructure Think traditional firewall and network security platforms. That model naturally introduces: - More exposed services - More patch management - More upgrade cycles - And inevitably more potential CVEs Other vendors were built cloud-native from day one. Fully SaaS-native security platforms work very differently. When security is delivered 100% SaaS: • No appliances to maintain • No on-prem management layer • Patching happens centrally in the provider’s cloud • The public attack surface is significantly smaller Less exposed infrastructure → less opportunity for publicly disclosed vulnerabilities. Important nuance: More CVEs does NOT automatically mean worse security. It can also reflect: • A larger product portfolio • Greater transparency in vulnerability disclosure • A bigger global installed base Organizations like CISA also play an important role here. They maintain the Known Exploited Vulnerabilities (KEV) catalog and provide guidance on which vendor vulnerabilities organizations should prioritize and remediate first. So CVE counts alone never tell the full story. But they do raise an interesting question: If security vendors build products to protect others… how secure are the vendors themselves? Curious to hear the community’s perspective
Interesting information. And I've been talking about it A LOT recently... and my question is: "Why are people still buying it?" I'd like to see a second level of this graph showing the proportion of higher-severity CVEs versus the total... My feeling is that Palo Alto and Fortinet will still be leading... by far. One correction: the proportion of the bars... following Zscaler's CVEs count (and 8 is still way too much), the Fortinet bar would be reaching out the building down the road...
intersting take, CVEs happen as a result of innovation and pushing code, Microsoft and Cisco have published thousands of CVEs over the last 5 years, with Microsoft leading at over 1,800 and Cisco around 350 Both of which will claim to be security companies also CVEs are only a small part part of any story and most amount to nothing when organisation have in depth strategy, i mean who cares if you can exploit my do-hicky when there is no service or data that can be impacted as a result of that exploit, while CVEs exist, folks meed to understand 1. isnit exploitable, 2. what is the impact of that, 3. what is the onward exposure that leads to number of CVEs is just a binary number, the average organisation takes over 190 days to patch one
HI how do you analyse this chart? What s the criticity of vulns? How can you compare a rough number without comparing thie criticity, time to remediate and number of products / lines of code... It would be like saying that there are more stairs from ground floor to the top of Burj Kalifa than to escalate the eiffel tower which is 3 time smaller. Judt my 2 cent, i m just a sales guy...
Niels Hoekman this comparison is fundamentally flawed. CVE counts between customer-deployed software and SaaS platforms are not comparable. When software runs in customer environments, vulnerabilities must be disclosed so customers can patch them → CVEs get issued. In SaaS, the vendor can patch silently in their backend and no CVE is ever created. So fewer CVEs often means less visibility, not fewer vulnerabilities. The “smaller attack surface” claim is also misleading. SaaS doesn’t remove risk — it centralizes it. Compromise an appliance → one organization affected. Compromise a SaaS security platform → potentially thousands of tenants impacted simultaneously. SaaS can absolutely improve operational hygiene and patch speed, which is valuable. But arguing it is inherently safer because it produces fewer CVEs is a category mistake. It mostly reflects how disclosure works, not how secure the systems actually are.
What's the source of this data? Moti Sagey מוטי שגיא
Niels Hoekman maybe also balance this post with a time to remediate chart.
Every product has and will have vulnerabilities. But I have other thought, more vulnerabilities does tell something about internal development and testing processes, especially the consistent severity of reported vulnerabilities. Vendors do have teams that perform bug scrubbing. But also from business perpective, these devices would can become operational overhead.
MONARCH Control is the answer
Asure Software•3K followers
2wWhy is 225 above 400?