Built on the Qualys Cloud Platform, ThreatPROTECT correlates data from vulnerability scans and active threat data from multiple sources into a single dynamic dashboard to provide a holistic and contextual view of an organization's threat exposure. With ThreatPROTECT, customers can visualize, prioritize and take action to minimize exposure from vulnerabilities related to the threats that matter most.
Not all Common Vulnerabilities and Exposures (CVEs) are created equal. According to the 2015 Verizon Data Breach Investigations Report, about half of the CVEs, which were exploited, went from publish to pwn in less than a month, compromising organizational assets. 10 CVEs account for almost 97 percent of exploits, per the report.
Dealing with huge numbers of vulnerabilities remains an issue for most organizations, as fixing every issue can take a considerable amount of time. Chasing the deployment of fixes to every vulnerability results in more critical issues being left unaddressed for longer periods.
Organizations must prioritize remediation efforts to have an immediate and measurable impact on risk reduction. This requires not only accurately identifying vulnerabilities, but also understanding a variety of point-in-time factors that contribute significantly to the overall risk exposure. For example, certain vulnerabilities with publicly available exploits that are actively being leveraged by attackers present greater threat exposure compared to less well-known and automated vulnerabilities. Providing actionable security intelligence with organizational context leads to better countermeasures against the threats that matter most, protecting IT assets against compromises and protecting the organizational brand.
Leveraging vulnerability data collected via
RTIs are external data points that enrich and provide context when correlated with vulnerability scan data collected by
"In today's rapidly changing threat landscape, the most effective way for companies to protect themselves is to accurately identify assets, prioritize threats and take action to prevent a compromise," said
Source of
RTI | Description |
Zero Day | Active attack has been observed in the wild but there is no patch from the vendor. |
Exploit Public | Exploit Knowledge is well known and a working exploitation code is publically available. Potential of active attacks is very high. |
Actively Attacked | Active attacks have been observed in the wild. If there are no patches, |
|
After a successful compromise, attacker has high potential to compromise other machines in the network. |
Easy Exploit | The attack can be carried out easily and requires little skills or does not require additional information. |
High Data Loss | Successful exploitation will result in massive data loss on the host. |
Denial of Service | Successful exploitation will result in denial of service. |
No Patch | Vendor has not provides an official fix. |
Malware | Malware has been associated with this vulnerability. |
Exploit Pack | Exploit Pack has been associated with this vulnerability. |
Additional Resources
- Stop by
Qualys' RSA booth (#N3421) for more information - Follow
Qualys on LinkedIn and Twitter
About
MEDIA CONTACT
LEWIS for
qualys@teamlewis.com
(781) 418-2406
Source:
News Provided by Acquire Media