It is becoming increasingly critical to manage both unknown and known vulnerabilities. In fact, since even novice cybercriminals can exploit publicly disclosed issues, it may be even more important to manage known vulnerabilities. Furthermore, fraudsters can examine information associated with known threats to develop new attacks and scout potential targets.

Intelligent Vulnerability Management

On one hand, it is important to fix vulnerabilities as quickly as possible. On the other hand, IT professionals must follow proper change management processes to ensure that systems are patched promptly and completely, and operations are restored.

It is equally crucial to prioritize remediation efforts, especially when there are limited resources. IBM BigFix offers real-time visibility into and control over all devices in an IT environment. It helps security analysts respond by answering questions such as:

  • What are the risks associated with a given vulnerability?
  • How many devices have the same vulnerability?
  • What patches are available to fix the problem?
  • How many devices does the patch apply to?

BigFix is based on machine learning that continuously assesses the state of endpoints in a network. After a patch is successfully installed, BigFix continues to verify the conditions of the vulnerability. If it detects an instance of noncompliance with a policy, patch or configuration, it reports the change to the server.

When integrated with IBM QRadar Vulnerability Manager (QVM), BigFix enables analysts to close the vulnerability management gap and remediate threats more effectively. QRadar scans vulnerabilities across a variety of devices and incorporates the data into the QRadar asset profile. With QRadar Risk Manager, analysts can prioritize vulnerabilities and assess the risk of each device. QVM then sends this data to BigFix, which identifies the appropriate fixlet to apply to the patches or quarantines the machine from the network, depending on the risk.

Be Proactive With BigFix

When managing vulnerabilities, it’s important to be proactive. BigFix provides continuous, intelligent endpoint protection, enabling analysts to maintain standardized baselines for security, compliance, configuration and patching. It also offers intelligent detection capabilities that evaluate alerts generated from millions of active endpoint anomalies, correlate events, recognize malicious behaviors and analyze root causes.

In other words, BigFix discovers what happened and reveals why it could be suspicious. It then guides analysts to conduct rapid remediation processes such as patching, reconfiguring or quarantining affected endpoints, or even remotely reimaging them altogether. Most importantly, BigFix provides real-time visibility throughout the endpoint security cycle. This visibility is the key to effective vulnerability management.

Sign up for a free 30-day trial of IBM BigFix

More from Intelligence & Analytics

What makes a trailblazer? Inspired by John Mulaney’s Dreamforce roast

4 min read - When you bring a comedian to offer a keynote address, you need to expect the unexpected.But it is a good bet that no one in the crowd at Salesforce’s Dreamforce conference expected John Mulaney to tell a crowd of thousands of tech trailblazers that they were, in fact, not trailblazers at all.“The fact that there are 45,000 ‘trailblazers’ here couldn’t devalue the title anymore,” Mulaney told the audience.Maybe it was meant as nothing more than a punch line, but Mulaney’s…

New report shows ongoing gender pay gap in cybersecurity

3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary.The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the field. In fact, only 17% of the 14,865 respondents to the survey were women.Pay gap between men and womenOne of the most concerning disparities revealed by…

Protecting your data and environment from unknown external risks

3 min read - Cybersecurity professionals always keep their eye out for trends and patterns to stay one step ahead of cyber criminals. The IBM X-Force does the same when working with customers. Over the past few years, clients have often asked the team about threats outside their internal environment, such as data leakage, brand impersonation, stolen credentials and phishing sites. To help customers overcome these often unknown and unexpected risks that are often outside of their control, the team created Cyber Exposure Insights…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today