Qualys ThreatPROTECT Presentation at RSA Conference 2016
-
Upload
qualys -
Category
Technology
-
view
92 -
download
0
Transcript of Qualys ThreatPROTECT Presentation at RSA Conference 2016
Qualys ThreatPROTECT
Tim White, Director of Product Management, Qualys
2
Overwhelmed with Vulnerabilities
2010 2011 2012 2013 2014 20150
1000
2000
3000
4000
5000
6000
7000
8000
9000
Vuln
erab
ilitie
s Pu
blis
hed
(100
0’s)
3
Where to Start?
"Organizations would need access to all threat intelligence indicators in order for the information to be helpful—a Herculean task"
Verizon Data Breach Report - 2015
4
Introducing ThreatPROTECT
Quickly identify the most important assets
and vulnerabilities requiring remediation
Realtime Threat Intelligence Attributes
Exploit PublicZero DayActively AttackedHigh Lateral Movement
5
Easy ExploitNo Patch
High Data LossDenial of Service
6
Demo: ThreatPROTECT
7
RoadmapExpanded Views of Intel DataCustomize Threat Intel AttributesExpanded template libraryAdditional Datapoints and Widgets for Dashboards
Exposure/Risk RollupIntegration:- iDefense- Remediation Ticketing- Continuous MonitoringCountermeasures and Compensating Controls
Thank youqualys.com/trial