Story image

IBM X-Force Red & Qualys introduce automated patching

19 Feb 2019

IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.

The two companies will leverage Qualys Cloud Platform and Qualys Patch Management solution to boost IBM’s X-Force Red Vulnerability Management Services.

Together, they will provide automated vulnerability prioritisation and patching. This will allow customers to simplify vulnerability remediation and fix critical vulnerabilities in less time and using less resources.

"Based on our many conversations with security leaders, prioritizing and remediating vulnerabilities seems to be the biggest vulnerability management headache," explains X-Force Red global head Charles Henderson.

According to IBM and Qualys, many organisations must manually identify and decipher vulnerabilities, and then decide which ones to fix first.

But the job doesn’t stop there – teams must then assign patching responsibilities and track remediation for each one, starting with the most critical vulnerabilities. All of this happens while vulnerabilities are exploitable and potentially exposing critical assets.

X-Force Red Vulnerability Management Services uses a proprietary algorithm to prioritize vulnerability remediation based on asset value, weaponisation, and other contextual factors. The team then facilitates the remediation process using a concurrency model. 

The top, most critical vulnerabilities are sent to the individuals in charge of remediation. As each is fixed, the next most critical vulnerability is then sent out, keeping the organisation focused on the highest risk vulnerabilities at all times.

"Qualys has released a patch management platform that automates patching with a click of a button. X-Force Red has created an algorithm that automatically prioritises vulnerabilities within minutes. By bringing our solutions together, we can offer organisations fast, effective and manageable remediation no matter how limited their resources and time,” says Henderson.

Qualys automates patch deployments using Qualys Cloud Agents. These agents allow IT and SecOps teams to centralise their patching and remediation of Windows, macOS and Linux operating systems, and hundreds of applications. 

Leveraging the Qualys PM solution, X-Force Red will be able to quickly target critical Common Vulnerability and Exposure IDs (CVEs) without researching knowledge base articles, then deploy the patch to endpoints, on-premises or cloud assets and verify remediation, all in less time.

Qualys WAS will allow X-Force Red to continuously discover and catalog web applications - including new and unknown ones, the companies state.

It will also allow X-Force Red to detect vulnerabilities and misconfigurations in web apps and APIs. Scaling to thousands of scans, WAS conducts incisive, thorough, and precise testing of browser-based web apps, mobile app backends, and Internet of Things (IoT) services.

Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Why AI and behaviour analytics should be essential to enterprises
Cyber threats continue to increase in number and severity, prompting cybersecurity experts to seek new ways to stop malicious actors.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Princeton study wants to know if you have a smart home - or a spy home
The IoT research team at Princeton University wants to know how your IoT devices send and receive data not only to each other, but also to any other third parties that may be involved.
Organisations not testing incident response plans – IBM Security
Failure to test can leave organisations less prepared to effectively manage the complex processes and coordination that must take place in the wake of an attack.
65% of manufacturers run outdated operating systems – Trend Micro
The report highlights the unique triple threat facing manufacturing, including the risks associated with IT, OT and IP.