SlideShare a Scribd company logo
HCL BigFix
Align security teams using Qualys® with IT
operations teams using BigFix and dramatically
compress vulnerability resolution time.
HCL BigFix Insights for Vulnerability
Remediation Integration with Qualys
Highlights
• Dramatically reduce the
gap between Security and
IT operations, reducing time
required to close discovered
vulnerabilities
• Automatically correlates
vulnerabilities discovered by
Qualys with the recommended
remediation Fixlets using BigFix
supersedence engine
• Shrinks attack surfaces and
closes the loop between
vulnerability detection and
remediation
• Requires no additional agents
or relays and has no impact
on the endpoint or network
performance
Today, it can take days or weeks for IT Operations to remediate vulnerabilities
found by IT Security, exposing organizations to potential attacks. As a result,
mitigating the risk of cyberattacks continues to top CIO and CISO lists of
concerns.
Companies who detect vulnerabilities using Qualys® are focused on seeking
out vulnerabilities across the organization. IT operations teams using BigFix®
systematically find and deploy the right patch for each unique vulnerability
identified by Qualys. In many cases, there is a communication gap between
these two teams, resulting in excessive manual effort, spreadsheet errors and
long windows of vulnerability. In fact, studies show that up to one-third of all
detected vulnerabilities remain open after a year, and over one-quarter are
never remediated.
BigFix Insights for Vulnerability Remediation can reduce the time it takes for IT
Operations to remediate vulnerabilities found by IT Security from days or weeks
to minutes or hours. BigFix Insights for Vulnerability Remediation automatically
correlates vulnerabilities discovered by Qualys with the most appropriate
patch and configuration settings enabling organizations to quickly prioritize
and deploy remediation actions, reducing the enterprise attack surface. Unlike
other solutions. BigFix leverages the broadest set of remediation capabilities,
both in terms of supported OS platforms and out of-the-box, certified
remediations.
BigFix Insights for Vulnerability Remediation is designed specifically for
organizations who use BigFix Lifecycle, BigFix Compliance, or BigFix Remediate
and who also use Qualys for vulnerability management.
BigFix Remediate
can resolve
vulnerabilities faster...
up to 96% faster!
Speed Remediation of Vulnerabilities -
How it works
BigFix Insights for Vulnerability Remediation
speeds remediation by automating manual
processes that are commonly seen in
organizations. Automated correlation of
vulnerability scan data from Qualys with
available Fixlets along with simple, prioritized
deployment workflows from BigFix speeds
remediation of endpoint vulnerabilities across
the enterprise.
The operational flow is:
1. A Security Operator performs a scan using
Qualys to identify the vulnerabilities across
the enterprise.
2. The vulnerabilities or Common Vulnerabilities
and Exposures (CVE®) identified by Qualys
are automatically correlated with BigFix’s
comprehensive patch data using the BigFix
Advanced Patch Correlation Engine. The
correlation engine:
a) Correlating the asset between Qualys and
BigFix.
b) Correlating the asset vulnerabilities between
Qualys and BigFix using CVEs.
c) Identifying the BigFix Fixlet that mitigates the
discovered vulnerability.
3. After correlation, staff can examine the
information and take action.
a) Data or Security Analysts can leverage
Business Intelligence Reports, drilling down
into the details to better understand the
vulnerabilities and potential remediations.
b) BigFix Operators can leverage the Vulnerability
Remediation Dashboard to see vulnerabilities
that can be remediated using available BigFix
Fixlets, and more importantly, immediately
target and deploy remediations.
Using this operational workflow, organizations
using Qualys can leverage BigFix Insights for
Vulnerability Remediation to dramatically reduce
the remediation time, manual errors and the attack
surface.
HCL BigFix
hcl-software.com
A Case Study of BigFix for Insights
Vulnerability Remediation
Typically, an IT operations or Security specialist will spend
2-3 minutes researching the right remediation for each
vulnerability. With potentially hundreds or thousands, that is a
lot of time spent. BigFix Insights for Vulnerability Remediation
automates this process with the Advanced Patch Correlation
Engine which:
What does this mean in business terms?
An organization with 1,000 running vulnerabilities will spend
up to 50 person-hours per assessment cycle researching
and correlating available fixes to the correct assets. With
BigFix Insights for Vulnerability Remediation, this time can
be reduced to less than two hours by automating manual
processes and reducing errors and associated rework. That is
96% less effort!
IT organization can also quickly implement fixes and
effectively prove compliance to auditors and executive
stakeholders. With BigFix Insights for Vulnerability
Remediation, IT Security and IT Operation teams can
collaborate effectively to quickly remediate vulnerabilities
discovered in a prioritized manner, providing significant
operational and organizational value to the CIO and CISO.
BigFix Insights for Vulnerability Remediation delivers
signification business value by:
• Aligning Security and Operations teams with intelligent
automation
• Compressing security vulnerability remediation times by
an order of magnitude
• Implementing fixes and proving compliance to all
stakeholders
• Reducing enterprise security risk, helping prevent
cyberattacks
BigFix Insights for Vulnerability Remediation
Application
The BigFix Insights for Vulnerability Remediation Application for Qualys
provides actionable views of the correlated data from Qualys and BigFix.
Each view helps IT and Security operators understand the magnitude
and severity of the vulnerabilities in different ways to enable effective
prioritization of remediation actions. Operators can leverage the interactive
visualizations to filter and drill down to more detail associated with the
correlated vulnerabilities and devices.
Three Granular Views
(1) Graphical overview/summary - Comprises three graphs or charts for a
high-level visual overview to enable very quick prioritization across multiple
contexts. The three graphs are shown in the top half of the image below and
depicts:
Top 10 Critical Exposures by CVE/Qualys ID - The first chart depicts
the top ten critical exposures by either CVE or Qualys ID to help you
quickly identify critical vulnerabilities with high exposures that can be
remediated by BigFix.
Vulnerabilities by Severity - The second chart depicts vulnerabilities
with available Fixlets by Qualys severity score or by CVSS. Qualys’s
severity score enables prioritization of vulnerabilities and the CVSS
(Common Vulnerability Scoring System) is an industry standard for
assessing the severity of vulnerabilities.
Vulnerabilities by Date Published and Severity - The third chart
augments the details provided in the Vulnerabilities by Severity chart.
Specifically, this graph adds the date published (i.e. the date the
vulnerability record was first added to the CVE List) for the top 10
vulnerabilities
(2) Data view - Depicts vulnerabilities with available Fixlets, along with the
number of affected devices in a tabular format. The data view provides the
ability to search each column for a specific value, filter, or sort the values in
column. The data view is shown in the bottom half of the image below.
(3) Vulnerability view - From the Data view, select a specific vulnerability to
view more detail including vulnerability metadata, available Fixlet content for
remediation, applicable devices, and deployment statuses.
hcl-software.com
About HCLSoftware   
HCLSoftware is a division of HCLTech (HCL) that operates its primary software business. It develops, markets, sells, and supports
over 30 product families in the areas of Digital Transformation, Data Analytics & Insights, Al and Automation, and Enterprise Security.
HCLSoftware has offices and labs around the world to serve thousands of customers. Its mission is to drive ultimate customer
success with their IT investments through relentless innovation of its products.
© Copyright 2023 HCL
All product names, trademarks and registered trademarks are property of their respective owners
hcl-software.com

More Related Content

Similar to Integration of Qualys with HCL BigFix Insights for Vulnerability Remediation

Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paper
Tawnia Beckwith
 
Top 10 Questions to Ask Your Vulnerability Management Provider
Top 10 Questions to Ask Your Vulnerability Management ProviderTop 10 Questions to Ask Your Vulnerability Management Provider
Top 10 Questions to Ask Your Vulnerability Management Provider
Tawnia Beckwith
 
201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep
Allan Crowe PCIP
 

Similar to Integration of Qualys with HCL BigFix Insights for Vulnerability Remediation (20)

The Security and Compliance Plan for Maxistar Medical Supplies Company
The Security and Compliance Plan for Maxistar Medical Supplies Company The Security and Compliance Plan for Maxistar Medical Supplies Company
The Security and Compliance Plan for Maxistar Medical Supplies Company
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdfHCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf
 
SecOps.pdf
SecOps.pdfSecOps.pdf
SecOps.pdf
 
ClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIES
ClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIESClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIES
ClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIES
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
US AI Safety Institute and Trustworthy AI Details.
US AI Safety Institute and Trustworthy AI  Details.US AI Safety Institute and Trustworthy AI  Details.
US AI Safety Institute and Trustworthy AI Details.
 
Cs cmaster
Cs cmasterCs cmaster
Cs cmaster
 
Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paper
 
Top 10 Questions to Ask Your Vulnerability Management Provider
Top 10 Questions to Ask Your Vulnerability Management ProviderTop 10 Questions to Ask Your Vulnerability Management Provider
Top 10 Questions to Ask Your Vulnerability Management Provider
 
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
 
Configuration Management: a Critical Component to Vulnerability Management
Configuration Management: a Critical Component to Vulnerability ManagementConfiguration Management: a Critical Component to Vulnerability Management
Configuration Management: a Critical Component to Vulnerability Management
 
Static Application Security Testing technology to Remediate Vulnerabilities
Static Application Security Testing technology to Remediate VulnerabilitiesStatic Application Security Testing technology to Remediate Vulnerabilities
Static Application Security Testing technology to Remediate Vulnerabilities
 
Bigfix Multicloud Management
Bigfix Multicloud ManagementBigfix Multicloud Management
Bigfix Multicloud Management
 
Trends in Cybersecurity - DNUG Stammtisch Wien
Trends in Cybersecurity - DNUG Stammtisch Wien Trends in Cybersecurity - DNUG Stammtisch Wien
Trends in Cybersecurity - DNUG Stammtisch Wien
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.com
 
Vulnerability scanning project
Vulnerability scanning projectVulnerability scanning project
Vulnerability scanning project
 
network-host-reconciliation
network-host-reconciliationnetwork-host-reconciliation
network-host-reconciliation
 
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdfCisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
 
201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep
 

More from HCLSoftware

More from HCLSoftware (20)

Maximize Investment and Unlock New Potential with Domino's Restart Plus
Maximize Investment and Unlock New Potential with Domino's Restart PlusMaximize Investment and Unlock New Potential with Domino's Restart Plus
Maximize Investment and Unlock New Potential with Domino's Restart Plus
 
Say Goodbye to Patching Pain Points: BigFix Delivers Continuous Security for ...
Say Goodbye to Patching Pain Points: BigFix Delivers Continuous Security for ...Say Goodbye to Patching Pain Points: BigFix Delivers Continuous Security for ...
Say Goodbye to Patching Pain Points: BigFix Delivers Continuous Security for ...
 
BigFix Mobile: Expanding Modern Endpoint Management to iOS and Android
BigFix Mobile: Expanding Modern Endpoint Management to iOS and AndroidBigFix Mobile: Expanding Modern Endpoint Management to iOS and Android
BigFix Mobile: Expanding Modern Endpoint Management to iOS and Android
 
HCL Domino Leap: Your Low-Code Pathway to Complex Web Applications
HCL Domino Leap: Your Low-Code Pathway to Complex Web ApplicationsHCL Domino Leap: Your Low-Code Pathway to Complex Web Applications
HCL Domino Leap: Your Low-Code Pathway to Complex Web Applications
 
Ready to Transform? Explore the Power of Domino v12 and CCB Licensing
Ready to Transform? Explore the Power of Domino v12 and CCB LicensingReady to Transform? Explore the Power of Domino v12 and CCB Licensing
Ready to Transform? Explore the Power of Domino v12 and CCB Licensing
 
Level Up Web App Security: Start Your Free Trial of HCL AppScan Source
Level Up Web App Security: Start Your Free Trial of HCL AppScan SourceLevel Up Web App Security: Start Your Free Trial of HCL AppScan Source
Level Up Web App Security: Start Your Free Trial of HCL AppScan Source
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuide
 
Streamline App Security Testing: Proven Solution for Risk Mitigation & Regula...
Streamline App Security Testing: Proven Solution for Risk Mitigation & Regula...Streamline App Security Testing: Proven Solution for Risk Mitigation & Regula...
Streamline App Security Testing: Proven Solution for Risk Mitigation & Regula...
 
Cloud-Based, All-In-One Security Solution, Robust and Scalable
Cloud-Based, All-In-One Security Solution, Robust and ScalableCloud-Based, All-In-One Security Solution, Robust and Scalable
Cloud-Based, All-In-One Security Solution, Robust and Scalable
 
HCL Commerce Cloud: Elevate Sales with Integrated B2B Solutions
HCL Commerce Cloud: Elevate Sales with Integrated B2B SolutionsHCL Commerce Cloud: Elevate Sales with Integrated B2B Solutions
HCL Commerce Cloud: Elevate Sales with Integrated B2B Solutions
 
Leading Grocer Trusts Digital Experience for Staff Portal.pdf
Leading Grocer Trusts Digital Experience for Staff Portal.pdfLeading Grocer Trusts Digital Experience for Staff Portal.pdf
Leading Grocer Trusts Digital Experience for Staff Portal.pdf
 
Biopharmaceutical Giant Modernizes On a Cost-Efficient Single Platform with H...
Biopharmaceutical Giant Modernizes On a Cost-Efficient Single Platform with H...Biopharmaceutical Giant Modernizes On a Cost-Efficient Single Platform with H...
Biopharmaceutical Giant Modernizes On a Cost-Efficient Single Platform with H...
 
All-In-One Security: Visibility, Risk Management. Versatile, Scalable, Deploy...
All-In-One Security: Visibility, Risk Management. Versatile, Scalable, Deploy...All-In-One Security: Visibility, Risk Management. Versatile, Scalable, Deploy...
All-In-One Security: Visibility, Risk Management. Versatile, Scalable, Deploy...
 
DRYiCE™ iAutomate: AI-enhanced Intelligent Runbook Automation
DRYiCE™ iAutomate: AI-enhanced Intelligent Runbook AutomationDRYiCE™ iAutomate: AI-enhanced Intelligent Runbook Automation
DRYiCE™ iAutomate: AI-enhanced Intelligent Runbook Automation
 
Elevate your SAP landscape's efficiency and performance with HCL Workload Aut...
Elevate your SAP landscape's efficiency and performance with HCL Workload Aut...Elevate your SAP landscape's efficiency and performance with HCL Workload Aut...
Elevate your SAP landscape's efficiency and performance with HCL Workload Aut...
 
Unlocking Success with Volt MX Lab Services for Low-Code Application Platforms
Unlocking Success with Volt MX Lab Services for Low-Code Application PlatformsUnlocking Success with Volt MX Lab Services for Low-Code Application Platforms
Unlocking Success with Volt MX Lab Services for Low-Code Application Platforms
 
Maximizing Business Efficiency and User Experience with HCL Domino Resta Plus
Maximizing Business Efficiency and User Experience with HCL Domino Resta PlusMaximizing Business Efficiency and User Experience with HCL Domino Resta Plus
Maximizing Business Efficiency and User Experience with HCL Domino Resta Plus
 
HCL Enterprise Ecommerce Solution: The Transaction Platform that Helps You Se...
HCL Enterprise Ecommerce Solution: The Transaction Platform that Helps You Se...HCL Enterprise Ecommerce Solution: The Transaction Platform that Helps You Se...
HCL Enterprise Ecommerce Solution: The Transaction Platform that Helps You Se...
 
Technology company advances to an AI-powered Customer experience with HCL Dig...
Technology company advances to an AI-powered Customer experience with HCL Dig...Technology company advances to an AI-powered Customer experience with HCL Dig...
Technology company advances to an AI-powered Customer experience with HCL Dig...
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing Partner
 

Recently uploaded

How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
Alluxio, Inc.
 

Recently uploaded (20)

Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAGAI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
GraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysisGraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysis
 
AI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning Framework
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 

Integration of Qualys with HCL BigFix Insights for Vulnerability Remediation

  • 1. HCL BigFix Align security teams using Qualys® with IT operations teams using BigFix and dramatically compress vulnerability resolution time. HCL BigFix Insights for Vulnerability Remediation Integration with Qualys Highlights • Dramatically reduce the gap between Security and IT operations, reducing time required to close discovered vulnerabilities • Automatically correlates vulnerabilities discovered by Qualys with the recommended remediation Fixlets using BigFix supersedence engine • Shrinks attack surfaces and closes the loop between vulnerability detection and remediation • Requires no additional agents or relays and has no impact on the endpoint or network performance Today, it can take days or weeks for IT Operations to remediate vulnerabilities found by IT Security, exposing organizations to potential attacks. As a result, mitigating the risk of cyberattacks continues to top CIO and CISO lists of concerns. Companies who detect vulnerabilities using Qualys® are focused on seeking out vulnerabilities across the organization. IT operations teams using BigFix® systematically find and deploy the right patch for each unique vulnerability identified by Qualys. In many cases, there is a communication gap between these two teams, resulting in excessive manual effort, spreadsheet errors and long windows of vulnerability. In fact, studies show that up to one-third of all detected vulnerabilities remain open after a year, and over one-quarter are never remediated. BigFix Insights for Vulnerability Remediation can reduce the time it takes for IT Operations to remediate vulnerabilities found by IT Security from days or weeks to minutes or hours. BigFix Insights for Vulnerability Remediation automatically correlates vulnerabilities discovered by Qualys with the most appropriate patch and configuration settings enabling organizations to quickly prioritize and deploy remediation actions, reducing the enterprise attack surface. Unlike other solutions. BigFix leverages the broadest set of remediation capabilities, both in terms of supported OS platforms and out of-the-box, certified remediations. BigFix Insights for Vulnerability Remediation is designed specifically for organizations who use BigFix Lifecycle, BigFix Compliance, or BigFix Remediate and who also use Qualys for vulnerability management. BigFix Remediate can resolve vulnerabilities faster... up to 96% faster!
  • 2. Speed Remediation of Vulnerabilities - How it works BigFix Insights for Vulnerability Remediation speeds remediation by automating manual processes that are commonly seen in organizations. Automated correlation of vulnerability scan data from Qualys with available Fixlets along with simple, prioritized deployment workflows from BigFix speeds remediation of endpoint vulnerabilities across the enterprise. The operational flow is: 1. A Security Operator performs a scan using Qualys to identify the vulnerabilities across the enterprise. 2. The vulnerabilities or Common Vulnerabilities and Exposures (CVE®) identified by Qualys are automatically correlated with BigFix’s comprehensive patch data using the BigFix Advanced Patch Correlation Engine. The correlation engine: a) Correlating the asset between Qualys and BigFix. b) Correlating the asset vulnerabilities between Qualys and BigFix using CVEs. c) Identifying the BigFix Fixlet that mitigates the discovered vulnerability. 3. After correlation, staff can examine the information and take action. a) Data or Security Analysts can leverage Business Intelligence Reports, drilling down into the details to better understand the vulnerabilities and potential remediations. b) BigFix Operators can leverage the Vulnerability Remediation Dashboard to see vulnerabilities that can be remediated using available BigFix Fixlets, and more importantly, immediately target and deploy remediations. Using this operational workflow, organizations using Qualys can leverage BigFix Insights for Vulnerability Remediation to dramatically reduce the remediation time, manual errors and the attack surface. HCL BigFix hcl-software.com
  • 3. A Case Study of BigFix for Insights Vulnerability Remediation Typically, an IT operations or Security specialist will spend 2-3 minutes researching the right remediation for each vulnerability. With potentially hundreds or thousands, that is a lot of time spent. BigFix Insights for Vulnerability Remediation automates this process with the Advanced Patch Correlation Engine which: What does this mean in business terms? An organization with 1,000 running vulnerabilities will spend up to 50 person-hours per assessment cycle researching and correlating available fixes to the correct assets. With BigFix Insights for Vulnerability Remediation, this time can be reduced to less than two hours by automating manual processes and reducing errors and associated rework. That is 96% less effort! IT organization can also quickly implement fixes and effectively prove compliance to auditors and executive stakeholders. With BigFix Insights for Vulnerability Remediation, IT Security and IT Operation teams can collaborate effectively to quickly remediate vulnerabilities discovered in a prioritized manner, providing significant operational and organizational value to the CIO and CISO. BigFix Insights for Vulnerability Remediation delivers signification business value by: • Aligning Security and Operations teams with intelligent automation • Compressing security vulnerability remediation times by an order of magnitude • Implementing fixes and proving compliance to all stakeholders • Reducing enterprise security risk, helping prevent cyberattacks BigFix Insights for Vulnerability Remediation Application The BigFix Insights for Vulnerability Remediation Application for Qualys provides actionable views of the correlated data from Qualys and BigFix. Each view helps IT and Security operators understand the magnitude and severity of the vulnerabilities in different ways to enable effective prioritization of remediation actions. Operators can leverage the interactive visualizations to filter and drill down to more detail associated with the correlated vulnerabilities and devices. Three Granular Views (1) Graphical overview/summary - Comprises three graphs or charts for a high-level visual overview to enable very quick prioritization across multiple contexts. The three graphs are shown in the top half of the image below and depicts: Top 10 Critical Exposures by CVE/Qualys ID - The first chart depicts the top ten critical exposures by either CVE or Qualys ID to help you quickly identify critical vulnerabilities with high exposures that can be remediated by BigFix. Vulnerabilities by Severity - The second chart depicts vulnerabilities with available Fixlets by Qualys severity score or by CVSS. Qualys’s severity score enables prioritization of vulnerabilities and the CVSS (Common Vulnerability Scoring System) is an industry standard for assessing the severity of vulnerabilities. Vulnerabilities by Date Published and Severity - The third chart augments the details provided in the Vulnerabilities by Severity chart. Specifically, this graph adds the date published (i.e. the date the vulnerability record was first added to the CVE List) for the top 10 vulnerabilities (2) Data view - Depicts vulnerabilities with available Fixlets, along with the number of affected devices in a tabular format. The data view provides the ability to search each column for a specific value, filter, or sort the values in column. The data view is shown in the bottom half of the image below. (3) Vulnerability view - From the Data view, select a specific vulnerability to view more detail including vulnerability metadata, available Fixlet content for remediation, applicable devices, and deployment statuses. hcl-software.com
  • 4. About HCLSoftware    HCLSoftware is a division of HCLTech (HCL) that operates its primary software business. It develops, markets, sells, and supports over 30 product families in the areas of Digital Transformation, Data Analytics & Insights, Al and Automation, and Enterprise Security. HCLSoftware has offices and labs around the world to serve thousands of customers. Its mission is to drive ultimate customer success with their IT investments through relentless innovation of its products. © Copyright 2023 HCL All product names, trademarks and registered trademarks are property of their respective owners hcl-software.com