Story image

Illumio & Qualys combine forces to offer vulnerability threat mapping

17 Apr 2018

Illumio and Qualys are joining forces to combine threat data and application dependency mapping to show potential cyber attack paths in real time – opening up another level of visibility across multiple clouds.

Vulnerability Maps will be available on Illumio’s Adaptive Security Platform, powered by data from the Qualys Cloud Platform.

“Digital transformation leads to an explosion of connected environments where perimeter protection is no longer enough. The focus now needs to shift from securing network perimeters to safeguarding data spread across applications, systems, devices, and the cloud,” comments Qualys CEO and chairman Philippe Courtot.

The company points to software vulnerabilities like Apache Struts, Meltdown and Spectre, all of which allow attackers to gain access to an environment or move laterally within data centres and clouds.

However, it is difficult to patch every vulnerability and some firms may be unable to patch critical ones for fear of breaking applications or production freezes.

“Vulnerability management is an invaluable tool in every security team’s arsenal. With our integration, organizations can see a map of how active, exposed vulnerabilities can potentially be exploited by a bad actor,” comments Illumio CEO Andrew Rubin.

The two companies engineered vulnerability maps to include micro-segmentation, one of Illumio’s go-to-market approaches to security.

The Illumio-Qualys partnership also brings micro-segmentation policies as compensating controls that can both reduce East-West exposure. The companies call this an East-West Exposure Score.

“Using workload, application, and connectivity context, Illumio gives organizations an exposure score for their East-West traffic. The score is calculated based on how many workloads can potentially exploit the vulnerabilities on any given workload. The lower the score, the smaller the chance that a bad actor can exploit it. If patching is not available, the optimal way to reduce exposure is to use micro-segmentation to reduce the number of workloads that can connect to it,” Illumio explains.

Last month the company opened its first Asia Pacific headquarters in Sydney as its first step in expanding its presence in the region. Rob van Es is the company’s vice president of Asia Pacific and is leading the APAC expansion.

“We have nearly 100 customers today. While the first companies to take advantage of our technology were large, highly regulated industries – such as financial institutions and global SaaS companies – the market is maturing, and we are increasingly seeing interest from mid-sized companies,” van Es said at the time.

“The need to secure the inside of data centres and cloud environments applies to all industries  – it’s an issue that all types of organisation is facing.”

Nuance biometrics fight back against fraud
Nuance Communications has crunched the numbers and discovered that it has prevented more than US$1 billion worth of fraud from being passed on to users of its Nuance Security Suite.
Attacks targeting Cisco Webex extension explode in popularity - WatchGuard
WatchGuard's Internet Security Report for Q4 2018 also finds growing use of a new sextortion phishing malware customised to individual victims.
Developing APAC countries most vulnerable to malware - Microsoft
“As cyberattacks continue to increase in frequency and sophistication, understanding prevalent cyberthreats and how to limit their impact has become an imperative.”
Worldwide spending on security to reach $103.1bil in 2019 - IDC
Managed security services will be the largest technology category in 2019.
Privacy: The real cost of “free” mobile apps
Sales of location targeted advertising, based on location data provided by apps, is set to reach $30 billion by 2020.
Myth-busting assumptions about identity governance - SailPoint
The identity governance space has evolved and matured over the past 10 years, changing with the world around it.
Forrester names Crowdstrike leader in incident response
The report provides an in-depth evaluation of the top 15 IR service providers across 11 criteria.
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.