![Page 1: Qualys ThreatPROTECT Presentation at RSA Conference 2016](https://reader036.vdocuments.mx/reader036/viewer/2022062522/589aba981a28abff4f8b6979/html5/thumbnails/1.jpg)
Qualys ThreatPROTECT
Tim White, Director of Product Management, Qualys
![Page 2: Qualys ThreatPROTECT Presentation at RSA Conference 2016](https://reader036.vdocuments.mx/reader036/viewer/2022062522/589aba981a28abff4f8b6979/html5/thumbnails/2.jpg)
2
Overwhelmed with Vulnerabilities
2010 2011 2012 2013 2014 20150
1000
2000
3000
4000
5000
6000
7000
8000
9000
Vuln
erab
ilitie
s Pu
blis
hed
(100
0’s)
![Page 3: Qualys ThreatPROTECT Presentation at RSA Conference 2016](https://reader036.vdocuments.mx/reader036/viewer/2022062522/589aba981a28abff4f8b6979/html5/thumbnails/3.jpg)
3
Where to Start?
"Organizations would need access to all threat intelligence indicators in order for the information to be helpful—a Herculean task"
Verizon Data Breach Report - 2015
![Page 4: Qualys ThreatPROTECT Presentation at RSA Conference 2016](https://reader036.vdocuments.mx/reader036/viewer/2022062522/589aba981a28abff4f8b6979/html5/thumbnails/4.jpg)
4
Introducing ThreatPROTECT
Quickly identify the most important assets
and vulnerabilities requiring remediation
![Page 5: Qualys ThreatPROTECT Presentation at RSA Conference 2016](https://reader036.vdocuments.mx/reader036/viewer/2022062522/589aba981a28abff4f8b6979/html5/thumbnails/5.jpg)
Realtime Threat Intelligence Attributes
Exploit PublicZero DayActively AttackedHigh Lateral Movement
5
Easy ExploitNo Patch
High Data LossDenial of Service
![Page 6: Qualys ThreatPROTECT Presentation at RSA Conference 2016](https://reader036.vdocuments.mx/reader036/viewer/2022062522/589aba981a28abff4f8b6979/html5/thumbnails/6.jpg)
6
Demo: ThreatPROTECT
![Page 7: Qualys ThreatPROTECT Presentation at RSA Conference 2016](https://reader036.vdocuments.mx/reader036/viewer/2022062522/589aba981a28abff4f8b6979/html5/thumbnails/7.jpg)
7
RoadmapExpanded Views of Intel DataCustomize Threat Intel AttributesExpanded template libraryAdditional Datapoints and Widgets for Dashboards
Exposure/Risk RollupIntegration:- iDefense- Remediation Ticketing- Continuous MonitoringCountermeasures and Compensating Controls
![Page 8: Qualys ThreatPROTECT Presentation at RSA Conference 2016](https://reader036.vdocuments.mx/reader036/viewer/2022062522/589aba981a28abff4f8b6979/html5/thumbnails/8.jpg)
Thank youqualys.com/trial