PRES PUBLIC v2 QualysGuard - Vulnerability - Management

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 24

Minimizing Risk by Implementing

Vulnerability Management Process


On time – On Budget – On demand

Edvinas Pranculis, MM, CISA, CISM


Agenda
 Environment, Challenges & Impact:
 Need for Vulnerability Management
 Vulnerability Management Process
 Capabilities Overview:
 QualysGuard Overview
 Software as a Service Model: Security & Coverage
 Summary
 Advantages & Benefits
Need for Vulnerability Management
 Vulnerabilities on a network Sources of Vulnerabilities
are GOLD to cyber criminals:

 Provide unauthorized entry to  Programming errors


networks
 Unintentional mistakes or
 Can expose confidential intentional malware in General
information, fuel stolen Public License software
identities, violate privacy laws,
 Improper system configurations
or paralyse operations
 Mobile users sidestepping
 Exposure is extreme for
perimeter security controls
networks with vulnerable
devices connected by IP  Rising attacks through viewing
popular websites
Need for Vulnerability Management
 Despite utilization of basic Attack Trends
defenses, network security
breaches abound
 TJX exposed 46M records  Increased professionalism and
 DSW exposed 1.4M records commercialization of malicious
 CardSystems exposed 40M activities
records  Threats that are increasingly
 215M+ reported record tailored for specific regions
exposures since 2005  Increasing numbers of
(actual is significantly higher) multistaged attacks
 Attackers targeting victims by
 Automation is Crucial first exploiting trusted entities
 Manual detection and  Convergence of attack methods
remediation workflow is too
slow, too expensive and  Shift from “Hacking for Fame”
ineffective to “Hacking for Fortune”
Need for Vulnerability Management
 Did we learn our lessons? Challenges IT Security Face

 Most vulnerabilities are


 NOT enough TIME, PEOPLE,
long known before
BUDGET
exploited
 Prioritization of efforts for
 Successful exploitation of
minimize business risks and
vulnerabilities can cause
protecting critical assets. We
substantial damage and
can’t fix all problems - what can
financial loss
we live with?
 A few vulnerable systems  Reduction of operational &
can disrupt the whole capital expenses
network
 Adapting to accelerating
 System misconfiguration change in sophistication of
can make systems attacks and increasing number
vulnerable of regulations
Key to Security: Network Scanning

Hacking Linux Exposed

“… the countermeasure that will


protect you, should a hacker scan
your machines with a scanner, is to
scan your own systems first.

Make sure to address any problems


and then a scan by a hacker will
give him no edge…”
Vulnerability Management Process

1. DISCOVERY
(Mapping)

2. ASSET
6. VERIFICATION
PRIORITISATION
(Rescanning)
(and allocation)

5. REMEDIATION 3. ASSESSMENT
(Treating Risks) (Scanning)

4. REPORTING
(Technical and
Executive)
QualysGuard: Discovery

 Mapping
 Gives hacker’s eye view of you
network
 Enables the detection of rogue
devices (Shadow IT)
QualysGuard: Asset Prioritisation
 Asset Prioritisation
 Some assets are more critical to
business then others
 Criticality depends of business
impact

 Asset Allocation
 Each asset should have an owner
QualysGuard: Assessment
 Signature Classification
 Vulnerability Signatures
 Application Fingerprints
 Service Signatures
 Device / OS Fingerprints
 Configuration Signatures
 Compliance Signatures

 QualysGuard Timely
Signatures
 725+ Devices/OS
 250+ Remote Services
 5800+ Vulnerability Signatures
 950+ Vendors
 2000+ Products
QualysGuard: Scanning
 Scanning:
 takes an “outside-in” and “inside-
in” approach to security, emulating
the attack route of a hacker
 tests effectiveness of security
policy and controls by examining
network infrastructure for
vulnerabilities
 Provides tools for untrusted and
authenticated scanning

“With QualysGuard, we gained the ability to


automatically scan everything we own for
vulnerabilities. And it provides us with a
documentation path for all servers including
best security practices, vulnerability ranking
and patches.”
Bureau Chief, Strategic IT
Florida Department of Health
QualysGuard: Reporting
 Reporting:
 Allows for generation,
storage and distribution
of reports for large enterprise
networks
 E-mail notifications allow users to
review reports upon completion
 Reports can be generated for
various compliance initiatives and
security requirements:
 Business Policy, PCI, SOX,
HIPAA, Basel II, etc.
 Security trend over a period of time
 Business risk or CVSS scoring
 Share reports with auditors,
operation staff, security & network
managers, executives
QualysGuard: Reporting
QualysGuard: Reporting
 Reporting:
 Reporting by business units or
asset groups
 Security trend over time

“If you can’t measure security, you can’t


manage it. Qualys lets me measure and
manage my network security. Their reports
demonstrate ongoing security improvement in
working with IT suppliers.”
Director of Global Information Security
ICI
QualysGuard: Remediation
 Remediation
 Tickets are either generated
automatically upon scan
completion based on polices or on
demand by users from any report
 Trouble tickets capture complete
audit trails and history of a
vulnerabilities on hosts
 QualysGuard scanners verifies the
ticket after its closed
 Integration with other helpdesk
solutions is available through API
“In vulnerability management, it’s all about
response time. Qualys’ remediation agent
directly assigns tickets to fix things to my
network technicians. The system then tracks
those fixes.”
Director of Enterprise Security
Wescorp
QualysGuard: Verification
 Re-scanning:
 Verifies applied patches and
confirm compliance
 Verifies the tickets after they are
closed

“Before QualysGuard we had an ad hoc


process; Qualys brought much stronger
control and visibility into our processes.
QualysGuard gives us the ability to detect our
vulnerabilities across our network and really
ensure that we have the level of security and
compliance we need.”
Chief Information Protection Officer
CIGNA
Benefits of Vulnerability Management
 Vulnerability management gives you control and visibility to
manage your networks security effectively and document
compliance

 Vulnerability management is PROACTIVE approach to security


Software as a Service Model

Deployability  6 000+ Appliances Deployed in >65 Countries


 Largest Single Enterprise Deployment: 223 Appliances in 52 Countries
Scalability  200+ Million IP Audits Per Year
Reliability  Six Sigma (99.99966%) Accuracy: <3.4 Defects per 1 Million Scans
QualysGuard Security & Coverage
 European Secure Operation
Center (Frankfurt/Germany)
 Multiple Security Levels
 24x7 Security Monitoring
 Scan Data Encrypted
(AES)
 Regular Customer On-Site
Audits
 SAS 70, BS 7799 & TUEV
Certification
Qualys Company Profile
 Qualys: Awards & Recognitions
 Founded in 1999 in France
 Headquarter in Redwood City,
 Recognized Market Leader in
USA
Vulnerability Management
 Branch offices in UK, Germany,
Gartner
France,
Hong Kong, Singapore  Best Vulnerability Assessment &
Remediation Solution
 >200 million IP audit scans per
year  Best Security Solution
SC Magazine
 More than 6 000 appliances
 Best Vulnerability Management
deployed in over 65 countries
Solution
 3200+ Customers, 37 Fortune eWeek Labs: Analyst Choice
100, 300+ Forbes Global 2000 Network World: Clear Choice
 Premier partnerships with BT,  Best Security Product
Cisco, CSC, Fujitsu, IBM, CNET Network
Symantec and Verisign
Qualys “Hall of Fame” by Industries
Insurance Financial Services Financial Services Chemical

Portals/Internet Retail Technology Consulting


Qualys “Hall of Fame” by Industries
Media Energy/Utilities Consumer Products Health Care

Manufacturing Education Transportation Government

D
Summary
 Vulnerability Management &  Infrastructure Provided by
QualysGuard Benefits: Qualys:
 Gives you control and visibility  NO Hardware & Software to Maintain
to manage your networks  Auto Software and Signature Updates
 Easy to Deploy and Manage from Any
security risks effectively and Web Browser
document compliance  Integrated Ticketing System
 automates most elements of  24/7 Support and Helpdesk
Vulnerability Management in
an efficient, cost-effective
manner
 enables you to cut your
vulnerability management
expenses by 50-90% when
compared to traditional
enterprise-software VM
solutions
Q&A

Thank you!

edvinas.pranculis@synergy.lt
www.synergy.lt
www.qualys.com

You might also like