Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

2/26/2015
08:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

BMC and Qualys Join Forces to Improve Enterprise Security

Integrated solution combines BMC BladeLogic and Qualys Vulnerability Management to quickly identify and remediate threats and boost collaboration between Security and IT Operations teams

SAN JOSE and REDWOOD CITY, Calif. – February 25, 2015 – As organizations move to become more digital, they must maintain the security and privacy of their digital assets: critical systems, data, and intellectual property. Today, BMC and Qualys announce the first solution to tie vulnerability information to automated remediation actions. This dramatically reduces the window of vulnerability while simultaneously improving IT operational performance. 

While data breaches can be catastrophic, most are preventable, as 80 percent of exploits utilize vulnerabilities with known fixes. One of the causes of successful attacks is the misalignment of objectives between the security team, responsible for identifying vulnerabilities, and the IT operations team, responsible for implementing the changes to the systems. This misalignment is the SecOps gap.

“Given the number of information security vulnerabilities that exist in the world today, security and IT operations can benefit tremendously from tighter collaboration and more efficient workflow,” said Michael Allen, information security officer at Morningstar, Inc. “With Intelligent Compliance, we now have an integrated solution to automate our information security processes, greatly reducing time and cost.”

The joint solution, Intelligent Compliance, addresses the gap through a combination of security and compliance audit data from Qualys Vulnerability Management (VM) with the associated action from BMC BladeLogic Server Automation to remediate the vulnerability.  Specifically, it helps:

·      Reduce the Window of Exposure to Vulnerabilities – accelerate remediation of vulnerabilities through automation

 

·      Avoid Downtime – make remediation actions predictable and safe, minimizing both planned and unplanned outages

 

·      Increase Speed and Frequency of Audits – run automated audits as frequently as needed, or even on-demand, without impacting other operational activities

 

·      Stay Compliant with Industry Regulations – take advantage of pre-built audit and remediation content for common policies

 

·      Lower the Cost of Audit and Remediation – automate actions that were previously manual

 

“The SecOps gap is a significant problem, undermining companies’ efforts to keep their customer information and intellectual property safe and secure,” said Phil Harris, CTO and president of Cloud and Data Center Automation at BMC. “The BladeLogic suite has always been a great way to remediate vulnerabilities and compliance issues quickly and safely, but now we are excited to combine that with Qualys’ extremely detailed vulnerability scanning data.”

“Reducing the window of exposure to vulnerabilities on critical systems is a fundamental proactive measure to deflect cyber attacks,” said Philippe Courtot, chairman, and CEO of Qualys, Inc. “Together with BMC, we can now offer the ability to not only identify threats in real time, but to significantly accelerate remediation while greatly reducing the time and cost required to conduct audits.”

Analyst perspective

Charles Kolodgy

Research vice president, secure products, IDC:

 

“Organizations face an escalating need to improve operational excellence in security and IT compliance, since the downsides of a security breach can be catastrophic.  One reason current approaches aren’t successful is a disconnect between security and operations teams.  The combination of vulnerability scanning solutions, like Qualys, and remediation solutions, like BMC BladeLogic, can improve a company's security posture and the IT organization's efficiency.  Any company in an industry or situation where security or compliance is important should investigate a combined solution like the Qualys and BMC integration.”

Availability

The integration between BladeLogic and Qualys is available now. For more information, current BMC and Qualys customers should contact their account managers, visit www.bmc.com/compliance, and join BMC and Qualys for a webinar, Get Complete IT Compliance: Reduce Risk and Cost, on March 10.

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5423
PUBLISHED: 2020-12-02
CAPI (Cloud Controller) versions prior to 1.101.0 are vulnerable to a denial-of-service attack in which an unauthenticated malicious attacker can send specially-crafted YAML files to certain endpoints, causing the YAML parser to consume excessive CPU and RAM.
CVE-2020-29454
PUBLISHED: 2020-12-02
Editors/LogViewerController.cs in Umbraco through 8.9.1 allows a user to visit a logviewer endpoint even if they lack Applications.Settings access.
CVE-2020-7199
PUBLISHED: 2020-12-02
A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gaining privileged access,...
CVE-2020-14260
PUBLISHED: 2020-12-02
HCL Domino is susceptible to a Buffer Overflow vulnerability in DXL due to improper validation of user input. A successful exploit could enable an attacker to crash Domino or execute attacker-controlled code on the server system.
CVE-2020-14305
PUBLISHED: 2020-12-02
An out-of-bounds memory write flaw was found in how the Linux kernel’s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat ...