Qualys, MetricStream build vulnerability framework

Powered by SC Magazine
 

Routes vulnerabilities through investigation and remediation processes.

Qualys has announced a partnership with MetricStream to create a framework that enables customers to identify, report and remediate vulnerabilities.

A combination of the MetricStream IT-GRC Solution and QualysGuard Vulnerability Management, it provides a single framework to monitor and capture asset and network vulnerabilities and route them through investigation and remediation.

According to the companies, this integration enables customers to identify and report on the vulnerabilities affecting business-critical assets, map security issues to business applications, and aggregate and rollup risk information across their enterprise for mitigation.

It works by the QualysGuard VM locating and identifying network devices and applications, and scanning them for vulnerabilities. It then provides information on the nature of those vulnerabilities.

MetricStream IT-GRC then imports this data and initiates remedial action by assigning investigative responsibilities to personnel.

Alerts ensure that action plans are carried out to closure, while dashboards and reports provide visibility of the status of each case, enabling tracking and trend analysis.

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, UK edition


Qualys, MetricStream build vulnerability framework
 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 702

Vote