Risk I/O Partners with Qualys to Monitor Data Violation within Perimeter
REDWOOD CITY, CA: Risk I/O, a vulnerability threat management platform, has announced partnership with Qualys where it has integrated QualysGuard Vulnerability Management (VM) into Risk I/O and bundled perimeter vulnerability scanning for its customers. For businesses that need to understand the vulnerability and threat risks of their organization’s perimeter in real-time, the new integration enables them to sync their vulnerability data with Risk I/O’s threat processing engine, allowing organizations to gain visibility into their most likely vector for a breach.
Risk I/O’s vulnerability threat management platform processes external Internet breach and exploit data and continuously matches it with vulnerability scan results. This happens on a near real-time basis allowing organizations to monitor their exposure to active Internet breaches and what vulnerabilities within their perimeters pose the greatest risks. With the addition of the QualysGuard vulnerability data, Risk I/O can now determine the likelihood of a breach in an organization’s perimeter. Risk I/O processes over a billion vulnerabilities a month against Internet breach data for its users.
“The addition of perimeter scanning to Risk I/O enables organizations to scan their organization’s perimeter and receive a complete risk analysis in a one stop shop so they can take action quickly and lower their risk of a breach,” said Risk I/O Co-founder and CEO, Ed Bellis. “We are pleased to partner with Qualys and integrate our solutions together giving customers a comprehensive solution that will ultimately help them become more secure and avoid data breaches.”
“Organizations must continuously monitor their global perimeters as hackers typically use it as their first point of entry to hack into corporate networks,” said Philippe Courtot, chairman and CEO for Qualys. “By combining Risk I/O’s threat processing with vulnerability data from QualysGuard, organizations can analyze in real-time those attack vectors that are most likely to be breached and proactively reduce the risk of cyber attacks.”