Qualys, MetricStream build vulnerability framework

Powered by SC Magazine
 

Routes vulnerabilities through investigation and remediation processes.

Qualys has announced a partnership with MetricStream to create a framework that enables customers to identify, report and remediate vulnerabilities.

A combination of the MetricStream IT-GRC Solution and QualysGuard Vulnerability Management, it provides a single framework to monitor and capture asset and network vulnerabilities and route them through investigation and remediation.

According to the companies, this integration enables customers to identify and report on the vulnerabilities affecting business-critical assets, map security issues to business applications, and aggregate and rollup risk information across their enterprise for mitigation.

It works by the QualysGuard VM locating and identifying network devices and applications, and scanning them for vulnerabilities. It then provides information on the nature of those vulnerabilities.

MetricStream IT-GRC then imports this data and initiates remedial action by assigning investigative responsibilities to personnel.

Alerts ensure that action plans are carried out to closure, while dashboards and reports provide visibility of the status of each case, enabling tracking and trend analysis.

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, UK edition


Qualys, MetricStream build vulnerability framework
 
 
 
Top Stories
Parliament passes law to let ASIO tap entire internet
Greens effort to limit devices fails.
 
Business-focused Windows 10 brings back the Start menu
Microsoft skips 9 for the "greatest enterprise platform ever".
 
Feeling Shellshocked?
Stay up to date with patching for the Bash bug.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  5%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1386

Vote