Cloud Platform
Cloud platform apps

See Resources

Threat Protection Solutions: ThreatPROTECT

With thousands of new vulnerabilities disclosed annually, not even the largest and most efficient IT department can promptly patch every single one within their environment. And even if they could, it wouldn’t be smart of them to take this approach, because vulnerabilities carry different levels of risk, ranging from trivial to critical.

Consequently, organizations must be highly selective when drafting their vulnerability remediation plans. They can’t base the process on guesswork or on an arbitrary patching schedule. Instead, they must pinpoint which IT assets must be patched with the greatest urgency at any given time.

Prioritize Your Vulnerability Remediation Work with Qualys ThreatPROTECT

Qualys built ThreatPROTECT to address this problem of vulnerability and threat disclosure overload by automating the large-scale and continuous data analysis that the process demands. ThreatPROTECT continuously correlates real-time threat information against your vulnerabilities and IT asset inventory, giving you a clear and comprehensive view of your organization’s threat landscape.


Control panel icon

Centralized Control and Visualization Panel

A single, dynamic dashboard includes customizable views, graphs and charts.

Experts icon

Threat Context from Qualys and Outside Experts

ThreatPROTECT appends relevant threat indicators to each vulnerability, such as “zero day” status, inclusion in an exploit kit and high data loss potential.

Live feed icon

The Live Feed

The Live Threat Intelligence Feed displays the latest vulnerability disclosures and maps them to your impacted IT assets.

Search icon

Powerful Search Function

The search engine lets you look for specific assets and vulnerabilities by crafting ad-hoc queries with multiple variables and criteria. Queries can be saved and turned into dashboard widgets.

Native component icon

Native Component of the Qualys Cloud Platform

No need to export our scan data for prioritization. This now integrated functionality is delivered with speed, convenience and accuracy unmatched by external tools.

Analysis icon

Robust Data Analysis

ThreatPROTECT's back end analysis engine continuously correlates external threat information with internal vulnerability and asset data.

Qualys ThreatPROTECT video

Learn more about Qualys ThreatPROTECT

Free Trial