Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

1/21/2014
02:14 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Qualys Announces Partnership With Lumension

Companies to offer joint customers a complete vulnerability assessment and patch management solution

January 21, 2014 SCOTTSDALE, AZ – Lumension®, a global leader in endpoint management and security and Qualys, Inc. (NASDAQ: QLYS), a pioneer and leading provider of cloud security and compliance solutions today announced a strategic partnership to provide joint customers with comprehensive vulnerability assessment and patch management solutions.

Under the agreement, Lumension will exclusively offer QualysGuard Vulnerability Management (VM) to current Lumension Scan customers and provide additional support in transitioning those customers to QualysGuard VM as Lumension will End-of-Life its Lumension Scan product effective April 25, 2014. QualysGuard VM automatically detects vulnerabilities across the organization which is a strong complement to Lumension® Patch and Remediation, which, under the partnership, will be integrated with QualysGuard VM to help customers effectively apply and validate patches on their endpoint.

"Lumension selected Qualys for this very important technology transition because we believe they could best meet the extensive criteria required by our Scan customers' need for a strong scan solution," said Rich Hlavka, Senior Vice President, Business Development, Lumension. "We are also very excited about the integration of our core Lumension Patch and Remediation technology into QualysGuard as our joint customers will enjoy a comprehensive vulnerability management solution."

"To keep up with business demands, organizations are seeing a proliferation of end point devices that they must secure against an ever-changing landscape of possible threats," said Philippe Courtot, chairman and CEO for Qualys. "We are pleased to partner with Lumension to offer a powerful integrated vulnerability management solution helping businesses and government agencies easily and cost effectively manage the security of their endpoint devices to keep IT assets and data across their organizations secure and compliant."

QualysGuard VM has received numerous awards and industry analyst accolades for market leadership, including: The Frost & Sullivan Global Market Share Leadership Award for Vulnerability Management for the third consecutive year, the 2013 SC Magazine Award for Best Vulnerability Management Tool for the fifth year, and #1 ranking in Device Vulnerability Assessment Worldwide by IDC for the fifth consecutive year.

Lumension Patch and Remediation is the world's leading patch management solution, and is available as capability on the Lumension® Endpoint Management and Security Suite. With Lumension Patch and Remediation, IT administrators can automatically identify and patch vulnerabilities across heterogeneous operating systems, Microsoft and non-Microsoft applications, and endpoint configurations - all of which is seamlessly managed through a single console.

###

About QualysGuard Vulnerability Management

Delivered as part of the QualysGuard Cloud Platform, QualysGuard Vulnerability Management, or QualysGuard VM, is an industry leading and award-winning solution that automates network auditing and vulnerability management across an organization, including network discovery and mapping, asset management, vulnerability reporting, and remediation tracking. Driven by our comprehensive KnowledgeBase of known vulnerabilities, QualysGuard VM enables cost-effective protection against vulnerabilities without substantial resource deployment.

About Qualys

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud security and compliance solutions with over 6,000 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The QualysGuard Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and Web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations, including Accuvant, BT, Dell SecureWorks, Fujitsu, NTT, Symantec, Verizon, and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA). For more information, please visit http://www.qualys.com.

About Lumension

Lumension Security, Inc., a global leader in endpoint management and security, develops, integrates and markets security software solutions that help businesses protect their vital information and manage critical risk across network and endpoint assets. Lumension enables more than 5,100 customers worldwide to achieve optimal security and IT success by delivering a proven and award-winning solution portfolio that includes Vulnerability Management, Endpoint Protection, Data Protection, Antivirus and Reporting and Compliance offerings. Lumension is known for providing world-class customer support and services 24x7, 365 days a year. Headquartered in Scottsdale, Arizona, Lumension has operations worldwide, including Virginia, Texas, Utah, Florida, Ireland, Luxembourg, the United Kingdom, Australia and Singapore. Lumension: IT Secured. Success Optimized.&trade More information can be found at lumension.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18954
PUBLISHED: 2019-11-14
Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious at...
CVE-2019-3640
PUBLISHED: 2019-11-14
Unprotected Transport of Credentials in ePO extension in McAfee Data Loss Prevention 11.x prior to 11.4.0 allows remote attackers with access to the network to collect login details to the LDAP server via the ePO extension not using a secure connection when testing LDAP connectivity.
CVE-2019-3661
PUBLISHED: 2019-11-14
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attacker to execute database commands via carefully constructed time based payloads.
CVE-2019-3662
PUBLISHED: 2019-11-14
Path Traversal: '/absolute/pathname/here' vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attacker to gain unintended access to files on the system via carefully constructed HTTP requests.
CVE-2019-3663
PUBLISHED: 2019-11-14
Unprotected Storage of Credentials vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows local attacker to gain access to the root password via accessing sensitive files on the system.