Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Qualys Launches Threat Intelligence Solution

SAN FRANCISCO – RSA CONFERENCE 2016 – Cloud security and compliance solutions provider Qualys has announced a new solution that gathers and correlates data from vulnerability scans and threat feeds to give organizations a view of their potential exposure to threats.

SAN FRANCISCO – RSA CONFERENCE 2016 – Cloud security and compliance solutions provider Qualys has announced a new solution that gathers and correlates data from vulnerability scans and threat feeds to give organizations a view of their potential exposure to threats.

While the company has previously offered threat intelligence modules from partners for its cloud-based platform, Redwood City, Calif.-based Qualys now has a solution dedicated to helping customers prioritize their threat remediation efforts.

Built on the Qualys Cloud Platform, the new ThreatPROTECT offering lets customers visualize, prioritize and take action to minimize exposure from vulnerabilities related to the threats that matter most to their environments. 

Leveraging vulnerability data collected via Qualys scanners and via Qualys Cloud Agents, ThreatPROTECT correlates the data with Real-time Threat Indicators (RTI) from multiple industry sources, providing customers with a dashboard that provides insight into which vulnerabilities they should fix first.

“RTIs are external data points that enrich and provide context when correlated with vulnerability scan data collected by Qualys,”the company explained. “RTIs can be used on a standalone basis or cascaded with each other to prioritize efforts for patching, or to select compensating controls to reduce exposure when patches are not available.” 

Qualys gathers and correlates RTI information from its own research and from external sources, including Core Security, Exploit Database, Immunity, TrendMicro, VeriSign iDefense and others.

“In today’s rapidly changing threat landscape, the most effective way for companies to protect themselves is to accurately identify assets, prioritize threats and take action to prevent a compromise,” said Philippe Courtot, Qualys chairman and CEO.

Qualys ThreatPROTECT Screenshot

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Threat Intelligence

How threat intelligence is critical when justifying budget for GRC personnel, and for threat intelligence, incident response, security operations and CISO buyers.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.