![]()
Qualys not only highlights and ranks the vulnerabilities, but also makes precise recommendations for how best to remediate them - a critical advantage for teams in smaller business units that may have limited IT security resources.
John Bruylant Group CTO at Sodexo
Qualys Multi-Vector EDR and Context XDR leverage the Qualys Cloud Platform and empower organizations with hyper-accurate threat detection and real-time prevention of identity-based attacks combining the power of advanced AI, behavioral analytics and a flexible policy engine to enforce risk-based conditional access.
Qualys’ threat protection solutions continually correlate external threat data with vulnerability gaps in your IT environment, so your remediation priority decisions are rooted in concrete, up-to-date, applicable data—not in guesswork or arbitrary schedules. That way, you stay a step ahead of hacks and attacks, patching bugs before the bad guys exploit them.
Leverage the comprehensive IT asset catalog of Qualys asset inventory capabilities and Qualys VMDR’s Six Sigma vulnerability detection accuracy
Prioritize remediation with precision and flexibility in a continual, contextual and automated manner, so the constant stream of new bug disclosures doesn’t overwhelm your time or resources
Connect the dots and flag at-risk IT assets wherever they reside—on premises, in cloud environments or at mobile endpoints
Improve the efficiency of DevOps teams by bringing threat prioritization clarity into the application development and deployment lifecycle via integrations with CMDB and CI/CD tools
Deliver a dynamic snapshot of all existing vulnerabilities in your IT environment at any point in time
Achieve actionable intelligence, enabling you to assess criticality of certain threat scenarios in your organization’s unique business environment
Qualys Threat Protection’s search engine provides a powerful tool to look for specific assets and vulnerabilities. You can quickly and proactively identify systems across your entire IT environment that are exposed to specific threats, and then take remediation action right away. The search syntax is intuitive with a query auto-complete feature. Threat Protection’s search engine lets you:
Craft ad hoc queries with multiple variables and criteria such as asset class, vulnerability type, RTI, tag, and operating system; for example, search all vulnerabilities that have a severity rating of 5, are easy to exploit and were disclosed within the last five days
Sort, filter and refine search results
Save any search, download results and share them
Turn queries you run regularly into permanent dashboard widgets that are dynamically updated in real time
Qualys Threat Protection’s Live Threat Intelligence Feed keeps organizations up-to-date on the latest vulnerabilities and news, so your cybersecurity team remains informed about new disclosures and existing bugs with rising risk severity. The Live Threat Intelligence Feed:
Manages the flood of new vulnerability disclosures, so you’re aware of the latest threats exploited in the wild
Displays how many IT assets are impacted by each disclosure, thanks to the solution’s powerful data correlation capabilities
Segments its content into different columns, including high-rated” items that Qualys flags as well as your handpicked favorites pinned to the feed’s UI
Drills down on feed entries for further details and more granular information on a particular vulnerability and affected IT assets
Allows fine-tuning to narrow down the feed list by filtering and sorting items according to a variety of criteria for downloading by remediation teams
Qualys Threat Protection appends real-time threat indicators (RTIs) to vulnerabilities, tapping findings from Qualys and external sources. Combining this threat intelligence with internal criteria (such as asset role) helps you prioritize remediation. For example, you can review all RTIs for vulnerabilities on a host, and then drill down to specific vulnerabilities behind an RTI. Threat Protection RTIs include:
ZERO DAY – Vulnerabilities for which there is no vendor patch available and an active attack has been observed in the wild
PUBLIC EXPLOIT – Vulnerabilities whose exploit knowledge is well known and for which exploit code exists and is publicly available
ACTIVELY ATTACKED – Vulnerabilities that are being actively attacked in the wild
HIGH LATERAL MOVEMENT – Vulnerabilities that, if compromised, let the attacker propagate the attack broadly across the breached network
EASY EXPLOIT – Vulnerabilities that can be exploited easily, requiring few skills and little knowledge
HIGH DATA LOSS – Vulnerabilities whose exploitation will result in massive data loss
DENIAL OF SERVICE – Vulnerabilities whose payload could overload or crash the compromised systems so that they become permanently or temporarily unavailable
NO PATCH – Vulnerabilities for which there isn’t a fix from the vendor
MALWARE – Vulnerabilities associated with malware infection
EXPLOIT KIT – Vulnerabilities for which an exploit kit is available
Customizable dashboards with dynamic widgets help you see your threat landscape in a holistic, consolidated way. You can drill down on the data, mine it for patterns, aggregate it in custom reports and represent it graphically. This visualization and analysis yield deep insights for patch prioritization. The custom dashboard:
Includes a view of the live feed, as well as a variety of widgets based on RTIs, in the default dashboard setup
Allows you to create customized dashboards tailored for different IT and business roles
Delivers easy access to more information about the assets flagged as vulnerable with a single click
Supports creation of dashboard widgets manually or from any search query
Sets specific thresholds for widget data and triggers certain actions in response, such as changing the widget’s background color from green to red
Sends notifications when used in conjunction with Qualys Continuous Monitoring
Generates reports that can quickly and easily be shared across the IT department with those responsible for patching the affected systems
Displays trend indicators in widgets, showing data fluctuations over time
Start your free trial today. No software to download or install. Email us or call us at 1 (800) 745-4355.