Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Qualys Launches Threat Intelligence Solution

SAN FRANCISCO – RSA CONFERENCE 2016 – Cloud security and compliance solutions provider Qualys has announced a new solution that gathers and correlates data from vulnerability scans and threat feeds to give organizations a view of their potential exposure to threats.

SAN FRANCISCO – RSA CONFERENCE 2016 – Cloud security and compliance solutions provider Qualys has announced a new solution that gathers and correlates data from vulnerability scans and threat feeds to give organizations a view of their potential exposure to threats.

While the company has previously offered threat intelligence modules from partners for its cloud-based platform, Redwood City, Calif.-based Qualys now has a solution dedicated to helping customers prioritize their threat remediation efforts.

Built on the Qualys Cloud Platform, the new ThreatPROTECT offering lets customers visualize, prioritize and take action to minimize exposure from vulnerabilities related to the threats that matter most to their environments. 

Leveraging vulnerability data collected via Qualys scanners and via Qualys Cloud Agents, ThreatPROTECT correlates the data with Real-time Threat Indicators (RTI) from multiple industry sources, providing customers with a dashboard that provides insight into which vulnerabilities they should fix first.

“RTIs are external data points that enrich and provide context when correlated with vulnerability scan data collected by Qualys,”the company explained. “RTIs can be used on a standalone basis or cascaded with each other to prioritize efforts for patching, or to select compensating controls to reduce exposure when patches are not available.” 

Qualys gathers and correlates RTI information from its own research and from external sources, including Core Security, Exploit Database, Immunity, TrendMicro, VeriSign iDefense and others.

“In today’s rapidly changing threat landscape, the most effective way for companies to protect themselves is to accurately identify assets, prioritize threats and take action to prevent a compromise,” said Philippe Courtot, Qualys chairman and CEO.

Qualys ThreatPROTECT Screenshot
Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.