Qualys TotalCloud offers clear explanations of identified vulnerabilities, aiding security and project teams in understanding and remediation. These user-friendly descriptions bridge the knowledge gap by providing essential context for those unfamiliar with security concepts. With a centralized dashboard, teams can readily access vulnerability details and take direct action to address them, streamlining the remediation process.
As a large organization, we've been using Qualys TotalCloud for a year. While it takes time to detect all containerized assets fully, we're gradually gaining comprehensive visibility within a single platform.
Qualys TotalCloud offers a unified platform for vulnerability and threat assessment across both Infrastructure as a Service and Software as a Service environment. Currently, our team utilizes IaaS, while a separate team manages SaaS. Qualys TotalCloud allows us to assess all software used within our infrastructure and categorize it based on the risk level of white, gray, or black. Whitelisted software poses no risk, while graylisted software may require remediation or controls, such as Data Loss Prevention or Anti-Virus, to mitigate potential risks. Blacklisted software is prohibited. This tool also helps identify unauthorized software, enabling us to remove it from our network and enhance overall security.
Qualys TotalCloud provides real-time risk assessment, including a TruRisk score that helps prioritize remediation efforts.
Qualys provides the TruRisk score, which we use to prioritize remediation efforts within our Service Level Agreement. We've collaborated with Qualys to develop a customized formula that considers whether a vulnerability is public-facing, resulting in adjusted risk scores. Any vulnerability that cannot be remediated within the SLA will be isolated from the network.
TruRisk helps identify a range of risks, but the public-facing application is a primary concern. Attackers often target this area by running scans and attempting to exploit vulnerabilities on the application or infrastructure side. To address this, we have a separate process based on the TruRisk score, which allows us to remediate all high-risk issues. While some vulnerabilities may appear to be a medium risk to us, they may pose a higher risk to the application or machine. TruRisk helps us identify and prioritize these discrepancies, enabling us to focus our efforts effectively.
Our infrastructure, encompassing over 300,000 machines, previously generated millions of vulnerabilities. However, by implementing the TruRisk score, we have successfully reduced these vulnerabilities to the thousands.