Qualys, Inc. unveiled Qualys Custom Assessment and Remediation, opening its Cloud Platform to give security architects access to custom scripts that can be natively integrated with other Qualys solutions. This new solution significantly reduces response time by empowering security teams to orchestrate workflows, secure custom applications, and take immediate action to counter threats like zero-day attacks lessening the need to rely on the IT operations teams. When threats hit, security teams need to quickly discover, assess and remediate both their third-party and custom applications. A typical response involves creating new out-of-band processes and custom scripts that need to be rolled out across hundreds or thousands of applications and endpoints by the security teams using a variety of techniques and ITSM tools.

This approach creates a blind spot from an auditing and tracking standpoint and negatively impacts responsiveness. Qualys Custom Assessment and Remediation leverages the comprehensive capabilities of the Qualys Cloud Platform to speed up your ability to respond to a detected security issue. It provides centralized control while helping teams remediate issues within their existing tools and workflows, saving them from inefficient, costly out-of-band rework cycles." Qualys Custom Assessment and Remediation opens the Qualys Platform for security architects allowing the creation of custom scripts in popular scripting languages, user-defined controls and automation, all seamlessly integrated within existing programs to quickly assess, respond and remediate threats across your global hybrid environment.

Qualys Custom Assessment and Remediation enables security teams to: Quickly Address Zero-Day Threats-- The solution puts the power to rapidly respond to zero-day vulnerabilities directly in the hands of the security team by automating processes such as collecting and evaluating data, synthesizing third- party threat intelligence feeds, and performing appropriate remediation actions, such as configuration changes, deleting suspicious files or deploying registry changes. The result is an accelerated MTTR, which is critical to containing an attack. Secure and Audit Custom Applications -- Security teams can add customized controls and processes, without IT intervention, for various organizational activities including remediation actions eliminating the need to reinvent new scripts.

This improves efficiency and allows security practitioners time to focus on more strategic activities.