Security News > 2022 > June > Qualys VMDR 2.0 with TruRisk: Taking vulnerability management to the next level
Automate Workflows - Qflow technology, built into the Qualys Cloud Platform, delivers drag and drop visual workflows to automate time-consuming and complex vulnerability management tasks such as performing vulnerability assessments for ephemeral cloud assets as they are launched or alerting for high profile threats or quarantine high-risk assets saving valuable resources and time.
With the VMDR 1.0 introduction in 2020, Qualys brought the four core elements of vulnerability management into a seamless workflow to help organizations efficiently respond to threats.
Qualys is again changing the vulnerability management game with its VMDR 2.0 with TruRisk.
Qualys VMDR with TruRisk differs from other vulnerability management solutions in that it helps quantify risk across vulnerabilities, assets and groups of assets - helping organizations proactively reduce risk exposure and track risk reduction over time.
We think our customer, Brian Penn, manager Security Posture at Aflac says it best, "Qualys VMDR with TruRisk has helped us improve our program by providing additional context to threat and risk, better identifying high risk vulnerabilities, some of which the common vulnerability scoring system had previously rated as low or medium severity. It was eye opening to see that some of the identified assets posing the highest organizational risk were not always being immediately detected. The transparency of the rating algorithm also made it easy to justify prioritization and get all relevant security and IT stakeholders aligned and move quickly to remediate the risk."
Qualys VMDR with TruRisk helped customers prioritize up to 45.53% fewer critical vulnerabilities - with many organizations able to reduce real risk by over 51.10%. Qualys VMDR with TruRisk will be generally available for all existing and prospective customers in late June.
News URL
https://www.helpnetsecurity.com/2022/06/06/qualys-vmdr-with-trurisk/
Related news
- Top Vulnerability Management Tools: Reviews & Comparisons 2024 (source)
- Setting a security standard: From vulnerability to exposure management (source)
- The effect of compliance requirements on vulnerability management strategies (source)
- Want to Grow Vulnerability Management into Exposure Management? Start Here! (source)