Story image

Illumio & Qualys combine forces to offer vulnerability threat mapping

17 Apr 18

Illumio and Qualys are joining forces to combine threat data and application dependency mapping to show potential cyber attack paths in real time – opening up another level of visibility across multiple clouds.

Vulnerability Maps will be available on Illumio’s Adaptive Security Platform, powered by data from the Qualys Cloud Platform.

“Digital transformation leads to an explosion of connected environments where perimeter protection is no longer enough. The focus now needs to shift from securing network perimeters to safeguarding data spread across applications, systems, devices, and the cloud,” comments Qualys CEO and chairman Philippe Courtot.

The company points to software vulnerabilities like Apache Struts, Meltdown and Spectre, all of which allow attackers to gain access to an environment or move laterally within data centres and clouds.

However, it is difficult to patch every vulnerability and some firms may be unable to patch critical ones for fear of breaking applications or production freezes.

“Vulnerability management is an invaluable tool in every security team’s arsenal. With our integration, organizations can see a map of how active, exposed vulnerabilities can potentially be exploited by a bad actor,” comments Illumio CEO Andrew Rubin.

The two companies engineered vulnerability maps to include micro-segmentation, one of Illumio’s go-to-market approaches to security.

The Illumio-Qualys partnership also brings micro-segmentation policies as compensating controls that can both reduce East-West exposure. The companies call this an East-West Exposure Score.

“Using workload, application, and connectivity context, Illumio gives organizations an exposure score for their East-West traffic. The score is calculated based on how many workloads can potentially exploit the vulnerabilities on any given workload. The lower the score, the smaller the chance that a bad actor can exploit it. If patching is not available, the optimal way to reduce exposure is to use micro-segmentation to reduce the number of workloads that can connect to it,” Illumio explains.

Last month the company opened its first Asia Pacific headquarters in Sydney as its first step in expanding its presence in the region. Rob van Es is the company’s vice president of Asia Pacific and is leading the APAC expansion.

“We have nearly 100 customers today. While the first companies to take advantage of our technology were large, highly regulated industries – such as financial institutions and global SaaS companies – the market is maturing, and we are increasingly seeing interest from mid-sized companies,” van Es said at the time.

“The need to secure the inside of data centres and cloud environments applies to all industries  – it’s an issue that all types of organisation is facing.”

Palo Alto Networks integrates RedLock and VM-Series with AWS Security Hub
AWS Security Hub is designed to provide users with a comprehensive view of their high-priority security alerts and compliance status.
Juniper simplifies data integration to improve threat detection
Updates to the Juniper Advanced Threat Prevention Appliances leverage third-party firewalls and security data sources.
Is mobile shopping compromising your enterprise security?
When employees do their holiday shopping on company resources, security teams have a challenge with the surge in browsing and online transactions.
Different approach to malware detection needed – VMware
Security needs to move away from the traditional approach of chasing after arbitrary forms of malware.
Modernising ERP systems can help organisations comply with GDPR
“Organisations need to look for modern ERP systems that are specifically designed with GDPR in mind."
Cyber attacks develop complexity, target Windows sysad tools - report
The report explores changes in the threat landscape over the past year, uncovering trends and how they are expected to impact cybersecurity in 2019.
DanaBot banking Trojan: How to protect your organisation
DanaBot is a Trojan written in the Delphi programming language that includes banking site web injections and stealer functions.
Ping Identity announces new Identity-as-a-Service solution
PingOne for Customers is built for the developer community and provides API-based identity services for customer-facing applications.