qualys threatprotect presentation at rsa conference 2016

Post on 08-Feb-2017

95 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Qualys ThreatPROTECT

Tim White, Director of Product Management, Qualys

2

Overwhelmed with Vulnerabilities

2010 2011 2012 2013 2014 20150

1000

2000

3000

4000

5000

6000

7000

8000

9000

Vuln

erab

ilitie

s Pu

blis

hed

(100

0’s)

3

Where to Start?

"Organizations would need access to all threat intelligence indicators in order for the information to be helpful—a Herculean task"

Verizon Data Breach Report - 2015

4

Introducing ThreatPROTECT

Quickly identify the most important assets

and vulnerabilities requiring remediation

Realtime Threat Intelligence Attributes

Exploit PublicZero DayActively AttackedHigh Lateral Movement

5

Easy ExploitNo Patch

High Data LossDenial of Service

6

Demo: ThreatPROTECT

7

RoadmapExpanded Views of Intel DataCustomize Threat Intel AttributesExpanded template libraryAdditional Datapoints and Widgets for Dashboards

Exposure/Risk RollupIntegration:- iDefense- Remediation Ticketing- Continuous MonitoringCountermeasures and Compensating Controls

Thank youqualys.com/trial

top related