Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

2/26/2015
08:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

BMC and Qualys Join Forces to Improve Enterprise Security

Integrated solution combines BMC BladeLogic and Qualys Vulnerability Management to quickly identify and remediate threats and boost collaboration between Security and IT Operations teams

SAN JOSE and REDWOOD CITY, Calif. – February 25, 2015 – As organizations move to become more digital, they must maintain the security and privacy of their digital assets: critical systems, data, and intellectual property. Today, BMC and Qualys announce the first solution to tie vulnerability information to automated remediation actions. This dramatically reduces the window of vulnerability while simultaneously improving IT operational performance. 

While data breaches can be catastrophic, most are preventable, as 80 percent of exploits utilize vulnerabilities with known fixes. One of the causes of successful attacks is the misalignment of objectives between the security team, responsible for identifying vulnerabilities, and the IT operations team, responsible for implementing the changes to the systems. This misalignment is the SecOps gap.

“Given the number of information security vulnerabilities that exist in the world today, security and IT operations can benefit tremendously from tighter collaboration and more efficient workflow,” said Michael Allen, information security officer at Morningstar, Inc. “With Intelligent Compliance, we now have an integrated solution to automate our information security processes, greatly reducing time and cost.”

The joint solution, Intelligent Compliance, addresses the gap through a combination of security and compliance audit data from Qualys Vulnerability Management (VM) with the associated action from BMC BladeLogic Server Automation to remediate the vulnerability.  Specifically, it helps:

·      Reduce the Window of Exposure to Vulnerabilities – accelerate remediation of vulnerabilities through automation

 

·      Avoid Downtime – make remediation actions predictable and safe, minimizing both planned and unplanned outages

 

·      Increase Speed and Frequency of Audits – run automated audits as frequently as needed, or even on-demand, without impacting other operational activities

 

·      Stay Compliant with Industry Regulations – take advantage of pre-built audit and remediation content for common policies

 

·      Lower the Cost of Audit and Remediation – automate actions that were previously manual

 

“The SecOps gap is a significant problem, undermining companies’ efforts to keep their customer information and intellectual property safe and secure,” said Phil Harris, CTO and president of Cloud and Data Center Automation at BMC. “The BladeLogic suite has always been a great way to remediate vulnerabilities and compliance issues quickly and safely, but now we are excited to combine that with Qualys’ extremely detailed vulnerability scanning data.”

“Reducing the window of exposure to vulnerabilities on critical systems is a fundamental proactive measure to deflect cyber attacks,” said Philippe Courtot, chairman, and CEO of Qualys, Inc. “Together with BMC, we can now offer the ability to not only identify threats in real time, but to significantly accelerate remediation while greatly reducing the time and cost required to conduct audits.”

Analyst perspective

Charles Kolodgy

Research vice president, secure products, IDC:

 

“Organizations face an escalating need to improve operational excellence in security and IT compliance, since the downsides of a security breach can be catastrophic.  One reason current approaches aren’t successful is a disconnect between security and operations teams.  The combination of vulnerability scanning solutions, like Qualys, and remediation solutions, like BMC BladeLogic, can improve a company's security posture and the IT organization's efficiency.  Any company in an industry or situation where security or compliance is important should investigate a combined solution like the Qualys and BMC integration.”

Availability

The integration between BladeLogic and Qualys is available now. For more information, current BMC and Qualys customers should contact their account managers, visit www.bmc.com/compliance, and join BMC and Qualys for a webinar, Get Complete IT Compliance: Reduce Risk and Cost, on March 10.

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21331
PUBLISHED: 2021-03-03
The Java client for the Datadog API before version 1.0.0-beta.9 has a local information disclosure of sensitive information downloaded via the API using the API Client. The Datadog API is executed on a unix-like system with multiple users. The API is used to download a file containing sensitive info...
CVE-2021-27940
PUBLISHED: 2021-03-03
resources/public/js/orchestrator.js in openark orchestrator before 3.2.4 allows XSS via the orchestrator-msg parameter.
CVE-2021-21312
PUBLISHED: 2021-03-03
GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is a vulnerability within the document upload function (Home > Management > Documents > Add, or /front/documen...
CVE-2021-21313
PUBLISHED: 2021-03-03
GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is a vulnerability in the /ajax/common.tabs.php endpoint, indeed, at least two parameters _target and id are not proper...
CVE-2021-21314
PUBLISHED: 2021-03-03
GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is an XSS vulnerability involving a logged in user while updating a ticket.