Story image

Illumio & Qualys combine forces to offer vulnerability threat mapping

17 Apr 18

Illumio and Qualys are joining forces to combine threat data and application dependency mapping to show potential cyber attack paths in real time – opening up another level of visibility across multiple clouds.

Vulnerability Maps will be available on Illumio’s Adaptive Security Platform, powered by data from the Qualys Cloud Platform.

“Digital transformation leads to an explosion of connected environments where perimeter protection is no longer enough. The focus now needs to shift from securing network perimeters to safeguarding data spread across applications, systems, devices, and the cloud,” comments Qualys CEO and chairman Philippe Courtot.

The company points to software vulnerabilities like Apache Struts, Meltdown and Spectre, all of which allow attackers to gain access to an environment or move laterally within data centres and clouds.

However, it is difficult to patch every vulnerability and some firms may be unable to patch critical ones for fear of breaking applications or production freezes.

“Vulnerability management is an invaluable tool in every security team’s arsenal. With our integration, organizations can see a map of how active, exposed vulnerabilities can potentially be exploited by a bad actor,” comments Illumio CEO Andrew Rubin.

The two companies engineered vulnerability maps to include micro-segmentation, one of Illumio’s go-to-market approaches to security.

The Illumio-Qualys partnership also brings micro-segmentation policies as compensating controls that can both reduce East-West exposure. The companies call this an East-West Exposure Score.

“Using workload, application, and connectivity context, Illumio gives organizations an exposure score for their East-West traffic. The score is calculated based on how many workloads can potentially exploit the vulnerabilities on any given workload. The lower the score, the smaller the chance that a bad actor can exploit it. If patching is not available, the optimal way to reduce exposure is to use micro-segmentation to reduce the number of workloads that can connect to it,” Illumio explains.

Last month the company opened its first Asia Pacific headquarters in Sydney as its first step in expanding its presence in the region. Rob van Es is the company’s vice president of Asia Pacific and is leading the APAC expansion.

“We have nearly 100 customers today. While the first companies to take advantage of our technology were large, highly regulated industries – such as financial institutions and global SaaS companies – the market is maturing, and we are increasingly seeing interest from mid-sized companies,” van Es said at the time.

“The need to secure the inside of data centres and cloud environments applies to all industries  – it’s an issue that all types of organisation is facing.”

How to stay safe when shopping online
Online shopping is a great way to avoid the crowds – but there are risks.
Dell EMC embeds security in latest servers
Dell EMC's 14th generation of PowerEdge servers has comprehensive management tools to provide security across hardware and firmware.
Why data backups should be a part of daily operations
"Disaster recovery needs to address complete system failure and provide a set of security policies to govern disaster incidents."
Businesses focusing on threats from within - survey
Over 50% of respondents reported that 100 days of dwell time or more was representative of their organisation.
Corelight and Exabeam partner to improve network monitoring
The combination of lateral movement and siloed usage of point security products leaves many security teams vulnerable to compromise.
SailPoint releases first identity annual report
SailPoint’s research found that many organisations are lacking maturity in their governance processes over identities.
Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.