Categories: AI Tools & Platforms

Qualys Enhances ETM Platform with AI-Driven Identity and Threat Tools

Expanding Horizons: Qualys Enhances Enterprise TruRisk Management Platform

Qualys has unveiled significant enhancements to its Enterprise TruRisk Management (ETM) platform, promising fresh capabilities that address the evolving landscape of cybersecurity threats. These updates now encompass enhanced identity security, industry-specific threat prioritization, and the integration of artificial intelligence (AI) for exploit validation.

The Pressing Need for Advanced Security Solutions

As the digital landscape shifts, so too do the risks organizations face. Qualys identifies the widespread adoption of AI as a dual-edged sword, one that not only escalates the volume of cyberattacks but complicates their nature. The swift rise of non-human digital identities—entities such as service accounts and automated processes—adds another layer of challenge for security teams. With the complexity of these threats continuously increasing, companies are now realizing the urgent need for proactive, intelligence-driven strategies tailored to their unique risk profiles.

Tyler Shields, a Principal Analyst at Omdia, emphasizes this point, stating, "Enterprises today need advanced solutions to address the growing risks from AI-driven threats and sophisticated adversaries." The enhancements brought to Qualys’ ETM platform aim to empower security teams, enabling them to operate with precision and efficiency while effectively managing risk.

Architecting a Unified Risk Management Framework

At the heart of the ETM platform’s enhancements is the introduction of a Risk Operation Centre (ROC) framework, designed to unify risk management efforts seamlessly. The platform has added several critical modules:

  • ETM Identity: This module focuses on human and non-human identity-related risks, consolidating visibility and remediation workflows across identity and access management systems.

  • TruLens: By leveraging real-time threat intelligence and contextual information, this module continuously updates exposure rankings, ensuring that security resources are deployed where they’re needed most.

  • TruConfirm: This component allows teams to simulate controlled exploit scenarios, validating the exploitability of vulnerabilities in real-time, thus informing prioritization for remediation efforts.

Together, these enhancements aim to ensure provable risk reduction by identifying, validating, and rapidly addressing actual threats before they evolve into cyber incursions.

Delving Deeper into ETM Identity

One of the standout modules, ETM Identity, plays a crucial role in providing a unified perspective on identity-related risks. By integrating visibility and remediation strategies for both human and non-human identities across various systems, security teams can derive a consolidated Identity TruRisk score. This score aids in pinpointing the most exploitable attack paths.

The emphasis on lateral movement attack paths, often exploited in data breaches, underscores the importance of securing high-risk service and machine identities. Corey Amsler from GE Vernova articulates this need, stating, "Security teams need unified insight that aligns identity risk with asset risk to act decisively."

Enhancing Threat Intelligence with TruLens

The TruLens module serves as a beacon for organizations navigating the continuously shifting threat landscape. By constantly analyzing emerging threats and combining live intelligence with the organization’s specific context, TruLens dynamically re-evaluates exposure rankings. This approach allows security teams to concentrate efforts on vulnerabilities likely to have significant operational impacts.

Moreover, TruLens aims to eliminate data silos by integrating fragmented information from diverse sources, ultimately providing actionable insights tailored to each organization’s unique environment. The added convenience of accessibility via a mobile application ensures that security teams can respond promptly to any threats.

Validating Vulnerabilities through TruConfirm

The TruConfirm module represents a significant leap forward in exploit validation. This capability allows security teams to simulate real-world attack scenarios to verify which vulnerabilities are genuinely exploitable. With these insights, teams can prioritize their remediation efforts effectively.

Once vulnerabilities are confirmed as exploitable, TruConfirm integrates with IT service management workflows to automate patching or mitigation processes, updating risk scores accordingly. This streamlined workflow enhances the overall responsiveness and agility of security operations.

Embracing AI in Cybersecurity Management

The rapid evolution of agentic AI is compelling security leaders to rethink their approaches to risk management. Sumedh Thakar, President and CEO of Qualys, highlights the importance of proactively reducing risk and anticipating potential attack vectors. He notes that organizations must also demonstrate the tangible impacts of their security investments to stakeholders.

Qualys’ enhanced ETM platform addresses these vital needs by integrating risk verification, focusing on user identities and exploit validation. This comprehensive approach provides clarity for security leaders, empowering them to communicate risk effectively and drive meaningful reductions at both executive and board levels.

As Qualys rolls out these advancements, the ETM platform aims to equip organizations with the tools they need to navigate the complexities of modern cybersecurity. The availability of developments such as ETM Identity, TruLens, and TruConfirm for selected customers signifies a pivotal step forward in addressing the urgent security challenges faced by enterprises today.

James

Recent Posts

Medical Record Review SaaS Firm Raises $12.7 Million

Wisedocs Secures $9.5 Million in Series A Funding to Revolutionize Medical Claims Processing Wisedocs, a…

18 hours ago

n8n Automation Bundle: 10+ Pre-built Workflows and Video Tutorials – Lifetime Access for AI-Powered Businesses | AI Insights

The Transformation of Automation with n8n: A New Era in Business Integration The landscape of…

18 hours ago

How to Understand Technology Through Insights from Top Experts

Understanding Key Concepts: ASO, SOAR, and VPN In today’s rapidly evolving technological landscape, it’s essential…

18 hours ago

Five Major Retail Technology Trends for 2026: AI, ESELs, Barcodes, and Personalization — Retail Technology Innovation Hub

The Beginning of the End for the Barcode For over half a century, the barcode…

18 hours ago

Future Tech Trends: Must-Have Gadgets for 2026

Embracing the Future: Technology Trends Transforming Our Daily Lives by 2026 As we hurtle toward…

19 hours ago

Top VPN Review Site: VPNReactor Claims the Top Spot

VPNReactor: Leading the Pack as the Best VPN Review Website in 2025 A Recognition Worth…

19 hours ago