You are on page 1of 3

Watch QRadar Vulnerability Manager in action

Jose F. Bravo April 28, 2014

Jose Bravo walks through some real-world scenarios for managing and prioritizing vulnerability
remediation activities.
To view the introductory video Watch QRadar Vulnerability Manager in action , please access
the online version of the article. If this article is in the developerWorks archives, the video is no
longer accessible.

Get the latest on IBM security intelligence and big data.

Use IBM security intelligence and big data solutions to uncover actionable insights into
modern,advanced data threats. Read the white paper and learn about understanding and
identifying advanced threats, expanding visibility with QRadar Security Intelligence, and
security Intelligence with InfoSphere® BigInsights™.

Download "Extending security intelligence with big data solutions."

In this demonstration video, Jose Bravo uses a real-world example installation of QRadar®
Vulnerability Manager (QVM) and shows how IT Security Operations can use is to prioritize
their work day. Jose shows how QVM can organize both the types and specific instances of

© Copyright IBM Corporation 2014 Trademarks


Watch QRadar Vulnerability Manager in action Page 1 of 3
developerWorks® ibm.com/developerWorks/

vulnerabilities on one screen. Because there can be tens of thousands, or even hundreds of
thousands of instances of vulnerabilities in an IT environment, QVM must help the IT security staff
prioritize their work.

Bravo shows how QVM can be used to filter out vulnerabilities that have not experienced traffic
recently and how to filter out vulnerabilities based on whether there are virtual patch rules in
place on the IPS systems to block exploitation of the vulnerability. He shows how QVM can read
Security Information and Event Management (SIEM) data to prioritize the vulnerability instances
that have actually experienced exploit traffic. He also demonstrates how QRadar Risk Manager
(QRM) can be used to generate policy-based risk assessments on the infrastructure and use those
assessments to further prioritize the security team's work. Finally, he demonstrates QVM's ability
to assign vulnerability management to members of the IT security team and track remediation
activities.

Watch QRadar Vulnerability Manager in action Page 2 of 3


ibm.com/developerWorks/ developerWorks®

Related topics
• Security on developerWorks community
• Security on developerWorks newsletter
• QRadar community on developerWorks

© Copyright IBM Corporation 2014


(www.ibm.com/legal/copytrade.shtml)
Trademarks
(www.ibm.com/developerworks/ibm/trademarks/)

Watch QRadar Vulnerability Manager in action Page 3 of 3

You might also like