"Qualys IOC now provides enhanced attack detection, investigation, and response for security analysts, incident responders, and managed security service providers. Leveraging the same Qualys Cloud Agent already deployed for an organization's asset inventory, vulnerability management, policy compliance, and patch management programs,
Qualys IOC 2.0 new detection, investigation, and response capabilities include:
- Behavior-based Scoring Engine to Prioritize Response
Security analysts often waste valuable time chasing false alarms, ghost alerts, and non-impactful malware infections with solutions that have a single scoring dimension. Qualys IOC's new incident scoring engine factors in additional behavior attributes including file analysis, process state, and network connections to prioritize responses based on how the attack is behaving in the network. This enables security analysts to respond to the most critical attacks first. - Enhanced Attack Detection Using Comprehensive File Reputation Threat Feed
Qualys IOC extends the detection of malicious, suspicious, and fileless attacks that are often missed by anti-virus agents through the native integration of a leading file reputation threat feed provider. This enhances attack detection while eliminating the cost and complexity required by other solutions to correlate events in external SIEMs that cannot scale to handle the event volume associated with modern attacks. - Real-Time and Historical Views of Attack Patterns Speed Investigation and Response
Powered byQualys' highly scalable Elasticsearch clusters, IOC now stores raw event telemetry and post-processed attack indicators across multiple dimensions: time-series and current state indexes. This enables security analysts to quickly answer and respond to the two most important questions to speed investigation and response: "Is the attack still live in my network?" and "At what point in the past did it happen?" - Real-Time Response Platform for Alerting and Actions
Analysts can create alerts and notifications, delivered by a new response platform microservice, to push the critical insights they need to investigate and remediate incidents as soon as they occur. Alerts are easy to manage using the same Qualys Query Language (QQL) already used by security analysts for two-second search for threat hunting, investigations, and dashboard widgets. Initial responses include email alerting, integration with ticketing systems, posting to Slack channels, and creatingPagerDuty incidents. Additional responses will be released throughout the year. - API and Ecosystem Integration
Qualys IOC public API enables integration with third-party SIEM, threat intelligence platforms, incident handling/response systems, security orchestration and automated response platforms, and IT Ticketing systems to automate rapid sharing of threat information with security and IT operational platforms. Support for the Qualys Technology Add-on (TA) forSplunk will be available in September.
Availability and Pricing
About
The Qualys Cloud Platform and its integrated cloud apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance, and protection for IT systems and web applications on-premises, on endpoints and elastic clouds. Founded in 1999 as one of the first SaaS security companies,
Media Contacts:
(650) 801-6196
tcasey@qualys.com
Highwire PR
(415) 963-4174
qualys@highwirepr.com
View original content:http://www.prnewswire.com/news-releases/qualys-indication-of-compromise-ioc-2-0-now-provides-advanced-attack-detection-investigation-and-response-capabilities-300892083.html
SOURCE