SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
HCL BigFix
Align security teams using Qualys® with IT
operations teams using BigFix and dramatically
compress vulnerability resolution time.
HCL BigFix Insights for Vulnerability
Remediation Integration with Qualys
Highlights
• Dramatically reduce the
gap between Security and
IT operations, reducing time
required to close discovered
vulnerabilities
• Automatically correlates
vulnerabilities discovered by
Qualys with the recommended
remediation Fixlets using BigFix
supersedence engine
• Shrinks attack surfaces and
closes the loop between
vulnerability detection and
remediation
• Requires no additional agents
or relays and has no impact
on the endpoint or network
performance
Today, it can take days or weeks for IT Operations to remediate vulnerabilities
found by IT Security, exposing organizations to potential attacks. As a result,
mitigating the risk of cyberattacks continues to top CIO and CISO lists of
concerns.
Companies who detect vulnerabilities using Qualys® are focused on seeking
out vulnerabilities across the organization. IT operations teams using BigFix®
systematically find and deploy the right patch for each unique vulnerability
identified by Qualys. In many cases, there is a communication gap between
these two teams, resulting in excessive manual effort, spreadsheet errors and
long windows of vulnerability. In fact, studies show that up to one-third of all
detected vulnerabilities remain open after a year, and over one-quarter are
never remediated.
BigFix Insights for Vulnerability Remediation can reduce the time it takes for IT
Operations to remediate vulnerabilities found by IT Security from days or weeks
to minutes or hours. BigFix Insights for Vulnerability Remediation automatically
correlates vulnerabilities discovered by Qualys with the most appropriate
patch and configuration settings enabling organizations to quickly prioritize
and deploy remediation actions, reducing the enterprise attack surface. Unlike
other solutions. BigFix leverages the broadest set of remediation capabilities,
both in terms of supported OS platforms and out of-the-box, certified
remediations.
BigFix Insights for Vulnerability Remediation is designed specifically for
organizations who use BigFix Lifecycle, BigFix Compliance, or BigFix Remediate
and who also use Qualys for vulnerability management.
BigFix Remediate
can resolve
vulnerabilities faster...
up to 96% faster!
Speed Remediation of Vulnerabilities -
How it works
BigFix Insights for Vulnerability Remediation
speeds remediation by automating manual
processes that are commonly seen in
organizations. Automated correlation of
vulnerability scan data from Qualys with
available Fixlets along with simple, prioritized
deployment workflows from BigFix speeds
remediation of endpoint vulnerabilities across
the enterprise.
The operational flow is:
1. A Security Operator performs a scan using
Qualys to identify the vulnerabilities across
the enterprise.
2. The vulnerabilities or Common Vulnerabilities
and Exposures (CVE®) identified by Qualys
are automatically correlated with BigFix’s
comprehensive patch data using the BigFix
Advanced Patch Correlation Engine. The
correlation engine:
a) Correlating the asset between Qualys and
BigFix.
b) Correlating the asset vulnerabilities between
Qualys and BigFix using CVEs.
c) Identifying the BigFix Fixlet that mitigates the
discovered vulnerability.
3. After correlation, staff can examine the
information and take action.
a) Data or Security Analysts can leverage
Business Intelligence Reports, drilling down
into the details to better understand the
vulnerabilities and potential remediations.
b) BigFix Operators can leverage the Vulnerability
Remediation Dashboard to see vulnerabilities
that can be remediated using available BigFix
Fixlets, and more importantly, immediately
target and deploy remediations.
Using this operational workflow, organizations
using Qualys can leverage BigFix Insights for
Vulnerability Remediation to dramatically reduce
the remediation time, manual errors and the attack
surface.
HCL BigFix
hcl-software.com
A Case Study of BigFix for Insights
Vulnerability Remediation
Typically, an IT operations or Security specialist will spend
2-3 minutes researching the right remediation for each
vulnerability. With potentially hundreds or thousands, that is a
lot of time spent. BigFix Insights for Vulnerability Remediation
automates this process with the Advanced Patch Correlation
Engine which:
What does this mean in business terms?
An organization with 1,000 running vulnerabilities will spend
up to 50 person-hours per assessment cycle researching
and correlating available fixes to the correct assets. With
BigFix Insights for Vulnerability Remediation, this time can
be reduced to less than two hours by automating manual
processes and reducing errors and associated rework. That is
96% less effort!
IT organization can also quickly implement fixes and
effectively prove compliance to auditors and executive
stakeholders. With BigFix Insights for Vulnerability
Remediation, IT Security and IT Operation teams can
collaborate effectively to quickly remediate vulnerabilities
discovered in a prioritized manner, providing significant
operational and organizational value to the CIO and CISO.
BigFix Insights for Vulnerability Remediation delivers
signification business value by:
• Aligning Security and Operations teams with intelligent
automation
• Compressing security vulnerability remediation times by
an order of magnitude
• Implementing fixes and proving compliance to all
stakeholders
• Reducing enterprise security risk, helping prevent
cyberattacks
BigFix Insights for Vulnerability Remediation
Application
The BigFix Insights for Vulnerability Remediation Application for Qualys
provides actionable views of the correlated data from Qualys and BigFix.
Each view helps IT and Security operators understand the magnitude
and severity of the vulnerabilities in different ways to enable effective
prioritization of remediation actions. Operators can leverage the interactive
visualizations to filter and drill down to more detail associated with the
correlated vulnerabilities and devices.
Three Granular Views
(1) Graphical overview/summary - Comprises three graphs or charts for a
high-level visual overview to enable very quick prioritization across multiple
contexts. The three graphs are shown in the top half of the image below and
depicts:
Top 10 Critical Exposures by CVE/Qualys ID - The first chart depicts
the top ten critical exposures by either CVE or Qualys ID to help you
quickly identify critical vulnerabilities with high exposures that can be
remediated by BigFix.
Vulnerabilities by Severity - The second chart depicts vulnerabilities
with available Fixlets by Qualys severity score or by CVSS. Qualys’s
severity score enables prioritization of vulnerabilities and the CVSS
(Common Vulnerability Scoring System) is an industry standard for
assessing the severity of vulnerabilities.
Vulnerabilities by Date Published and Severity - The third chart
augments the details provided in the Vulnerabilities by Severity chart.
Specifically, this graph adds the date published (i.e. the date the
vulnerability record was first added to the CVE List) for the top 10
vulnerabilities
(2) Data view - Depicts vulnerabilities with available Fixlets, along with the
number of affected devices in a tabular format. The data view provides the
ability to search each column for a specific value, filter, or sort the values in
column. The data view is shown in the bottom half of the image below.
(3) Vulnerability view - From the Data view, select a specific vulnerability to
view more detail including vulnerability metadata, available Fixlet content for
remediation, applicable devices, and deployment statuses.
hcl-software.com
About HCLSoftware   
HCLSoftware is a division of HCLTech (HCL) that operates its primary software business. It develops, markets, sells, and supports
over 30 product families in the areas of Digital Transformation, Data Analytics & Insights, Al and Automation, and Enterprise Security.
HCLSoftware has offices and labs around the world to serve thousands of customers. Its mission is to drive ultimate customer
success with their IT investments through relentless innovation of its products.
© Copyright 2023 HCL
All product names, trademarks and registered trademarks are property of their respective owners
hcl-software.com

More Related Content

Similar to Integration of Qualys with HCL BigFix Insights for Vulnerability Remediation (20)

DOC
Five Mistakes of Vulnerability Management
Anton Chuvakin
 
DOCX
The Security and Compliance Plan for Maxistar Medical Supplies Company
Abdulrahman Alamri
 
PDF
Vulnerability Management
GFI Software
 
PDF
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf
DNUG e.V.
 
PDF
SecOps.pdf
Aelum Consulting
 
PDF
ClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIES
Bruce Hafner
 
PDF
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
itnewsafrica
 
PDF
US AI Safety Institute and Trustworthy AI Details.
Bob Marcus
 
PDF
Cs cmaster
Hafid CHEBRAOUI
 
PDF
Getting the Most Value from VM and Compliance Programs white paper
Tawnia Beckwith
 
PDF
Top 10 Questions to Ask Your Vulnerability Management Provider
Tawnia Beckwith
 
PDF
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
Threat Stack
 
PDF
Configuration Management: a Critical Component to Vulnerability Management
Chris Furton
 
PDF
Static Application Security Testing technology to Remediate Vulnerabilities
HCLSoftware
 
PDF
Bigfix Multicloud Management
HCLSoftware
 
PDF
Trends in Cybersecurity - DNUG Stammtisch Wien
DNUG e.V.
 
DOC
Cyb 610 Inspiring Innovation--tutorialrank.com
PrescottLunt386
 
DOCX
Vulnerability scanning project
Chirag Dhamecha
 
PDF
AI-Powered DevOps_ How AI Revolutionize Software Delivery.pdf
Gyâñü Ðwïvêðï
 
PDF
network-host-reconciliation
Gordon Mackay - CISSP
 
Five Mistakes of Vulnerability Management
Anton Chuvakin
 
The Security and Compliance Plan for Maxistar Medical Supplies Company
Abdulrahman Alamri
 
Vulnerability Management
GFI Software
 
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf
DNUG e.V.
 
SecOps.pdf
Aelum Consulting
 
ClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIES
Bruce Hafner
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
itnewsafrica
 
US AI Safety Institute and Trustworthy AI Details.
Bob Marcus
 
Cs cmaster
Hafid CHEBRAOUI
 
Getting the Most Value from VM and Compliance Programs white paper
Tawnia Beckwith
 
Top 10 Questions to Ask Your Vulnerability Management Provider
Tawnia Beckwith
 
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
Threat Stack
 
Configuration Management: a Critical Component to Vulnerability Management
Chris Furton
 
Static Application Security Testing technology to Remediate Vulnerabilities
HCLSoftware
 
Bigfix Multicloud Management
HCLSoftware
 
Trends in Cybersecurity - DNUG Stammtisch Wien
DNUG e.V.
 
Cyb 610 Inspiring Innovation--tutorialrank.com
PrescottLunt386
 
Vulnerability scanning project
Chirag Dhamecha
 
AI-Powered DevOps_ How AI Revolutionize Software Delivery.pdf
Gyâñü Ðwïvêðï
 
network-host-reconciliation
Gordon Mackay - CISSP
 

More from HCLSoftware (20)

PDF
Maximize Investment and Unlock New Potential with Domino's Restart Plus
HCLSoftware
 
PDF
Say Goodbye to Patching Pain Points: BigFix Delivers Continuous Security for ...
HCLSoftware
 
PDF
BigFix Mobile: Expanding Modern Endpoint Management to iOS and Android
HCLSoftware
 
PDF
HCL Domino Leap: Your Low-Code Pathway to Complex Web Applications
HCLSoftware
 
PDF
Ready to Transform? Explore the Power of Domino v12 and CCB Licensing
HCLSoftware
 
PDF
Level Up Web App Security: Start Your Free Trial of HCL AppScan Source
HCLSoftware
 
PDF
Selecting an App Security Testing Partner: An eGuide
HCLSoftware
 
PDF
Streamline App Security Testing: Proven Solution for Risk Mitigation & Regula...
HCLSoftware
 
PDF
Cloud-Based, All-In-One Security Solution, Robust and Scalable
HCLSoftware
 
PDF
HCL Commerce Cloud: Elevate Sales with Integrated B2B Solutions
HCLSoftware
 
PDF
Leading Grocer Trusts Digital Experience for Staff Portal.pdf
HCLSoftware
 
PDF
Biopharmaceutical Giant Modernizes On a Cost-Efficient Single Platform with H...
HCLSoftware
 
PDF
All-In-One Security: Visibility, Risk Management. Versatile, Scalable, Deploy...
HCLSoftware
 
PDF
DRYiCE™ iAutomate: AI-enhanced Intelligent Runbook Automation
HCLSoftware
 
PDF
Elevate your SAP landscape's efficiency and performance with HCL Workload Aut...
HCLSoftware
 
PDF
Unlocking Success with Volt MX Lab Services for Low-Code Application Platforms
HCLSoftware
 
PDF
Maximizing Business Efficiency and User Experience with HCL Domino Resta Plus
HCLSoftware
 
PDF
HCL Enterprise Ecommerce Solution: The Transaction Platform that Helps You Se...
HCLSoftware
 
PDF
Technology company advances to an AI-powered Customer experience with HCL Dig...
HCLSoftware
 
PDF
Procuring an Application Security Testing Partner
HCLSoftware
 
Maximize Investment and Unlock New Potential with Domino's Restart Plus
HCLSoftware
 
Say Goodbye to Patching Pain Points: BigFix Delivers Continuous Security for ...
HCLSoftware
 
BigFix Mobile: Expanding Modern Endpoint Management to iOS and Android
HCLSoftware
 
HCL Domino Leap: Your Low-Code Pathway to Complex Web Applications
HCLSoftware
 
Ready to Transform? Explore the Power of Domino v12 and CCB Licensing
HCLSoftware
 
Level Up Web App Security: Start Your Free Trial of HCL AppScan Source
HCLSoftware
 
Selecting an App Security Testing Partner: An eGuide
HCLSoftware
 
Streamline App Security Testing: Proven Solution for Risk Mitigation & Regula...
HCLSoftware
 
Cloud-Based, All-In-One Security Solution, Robust and Scalable
HCLSoftware
 
HCL Commerce Cloud: Elevate Sales with Integrated B2B Solutions
HCLSoftware
 
Leading Grocer Trusts Digital Experience for Staff Portal.pdf
HCLSoftware
 
Biopharmaceutical Giant Modernizes On a Cost-Efficient Single Platform with H...
HCLSoftware
 
All-In-One Security: Visibility, Risk Management. Versatile, Scalable, Deploy...
HCLSoftware
 
DRYiCE™ iAutomate: AI-enhanced Intelligent Runbook Automation
HCLSoftware
 
Elevate your SAP landscape's efficiency and performance with HCL Workload Aut...
HCLSoftware
 
Unlocking Success with Volt MX Lab Services for Low-Code Application Platforms
HCLSoftware
 
Maximizing Business Efficiency and User Experience with HCL Domino Resta Plus
HCLSoftware
 
HCL Enterprise Ecommerce Solution: The Transaction Platform that Helps You Se...
HCLSoftware
 
Technology company advances to an AI-powered Customer experience with HCL Dig...
HCLSoftware
 
Procuring an Application Security Testing Partner
HCLSoftware
 
Ad

Recently uploaded (20)

PDF
iTop VPN With Crack Lifetime Activation Key-CODE
utfefguu
 
PPTX
Comprehensive Risk Assessment Module for Smarter Risk Management
EHA Soft Solutions
 
PDF
Adobe Premiere Pro Crack / Full Version / Free Download
hashhshs786
 
PDF
Automate Cybersecurity Tasks with Python
VICTOR MAESTRE RAMIREZ
 
PDF
유니티에서 Burst Compiler+ThreadedJobs+SIMD 적용사례
Seongdae Kim
 
PDF
Generic or Specific? Making sensible software design decisions
Bert Jan Schrijver
 
PDF
IObit Driver Booster Pro 12.4.0.585 Crack Free Download
henryc1122g
 
PPTX
Finding Your License Details in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PDF
AI + DevOps = Smart Automation with devseccops.ai.pdf
Devseccops.ai
 
PPTX
Change Common Properties in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PPTX
Homogeneity of Variance Test Options IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PPTX
Agentic Automation: Build & Deploy Your First UiPath Agent
klpathrudu
 
PDF
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
PDF
Odoo CRM vs Zoho CRM: Honest Comparison 2025
Odiware Technologies Private Limited
 
PPTX
In From the Cold: Open Source as Part of Mainstream Software Asset Management
Shane Coughlan
 
PPTX
Empowering Asian Contributions: The Rise of Regional User Groups in Open Sour...
Shane Coughlan
 
PDF
AOMEI Partition Assistant Crack 10.8.2 + WinPE Free Downlaod New Version 2025
bashirkhan333g
 
PPTX
Coefficient of Variance in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PDF
Driver Easy Pro 6.1.1 Crack Licensce key 2025 FREE
utfefguu
 
PDF
MiniTool Power Data Recovery 8.8 With Crack New Latest 2025
bashirkhan333g
 
iTop VPN With Crack Lifetime Activation Key-CODE
utfefguu
 
Comprehensive Risk Assessment Module for Smarter Risk Management
EHA Soft Solutions
 
Adobe Premiere Pro Crack / Full Version / Free Download
hashhshs786
 
Automate Cybersecurity Tasks with Python
VICTOR MAESTRE RAMIREZ
 
유니티에서 Burst Compiler+ThreadedJobs+SIMD 적용사례
Seongdae Kim
 
Generic or Specific? Making sensible software design decisions
Bert Jan Schrijver
 
IObit Driver Booster Pro 12.4.0.585 Crack Free Download
henryc1122g
 
Finding Your License Details in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
AI + DevOps = Smart Automation with devseccops.ai.pdf
Devseccops.ai
 
Change Common Properties in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
Homogeneity of Variance Test Options IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
Agentic Automation: Build & Deploy Your First UiPath Agent
klpathrudu
 
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
Odoo CRM vs Zoho CRM: Honest Comparison 2025
Odiware Technologies Private Limited
 
In From the Cold: Open Source as Part of Mainstream Software Asset Management
Shane Coughlan
 
Empowering Asian Contributions: The Rise of Regional User Groups in Open Sour...
Shane Coughlan
 
AOMEI Partition Assistant Crack 10.8.2 + WinPE Free Downlaod New Version 2025
bashirkhan333g
 
Coefficient of Variance in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
Driver Easy Pro 6.1.1 Crack Licensce key 2025 FREE
utfefguu
 
MiniTool Power Data Recovery 8.8 With Crack New Latest 2025
bashirkhan333g
 
Ad

Integration of Qualys with HCL BigFix Insights for Vulnerability Remediation

  • 1. HCL BigFix Align security teams using Qualys® with IT operations teams using BigFix and dramatically compress vulnerability resolution time. HCL BigFix Insights for Vulnerability Remediation Integration with Qualys Highlights • Dramatically reduce the gap between Security and IT operations, reducing time required to close discovered vulnerabilities • Automatically correlates vulnerabilities discovered by Qualys with the recommended remediation Fixlets using BigFix supersedence engine • Shrinks attack surfaces and closes the loop between vulnerability detection and remediation • Requires no additional agents or relays and has no impact on the endpoint or network performance Today, it can take days or weeks for IT Operations to remediate vulnerabilities found by IT Security, exposing organizations to potential attacks. As a result, mitigating the risk of cyberattacks continues to top CIO and CISO lists of concerns. Companies who detect vulnerabilities using Qualys® are focused on seeking out vulnerabilities across the organization. IT operations teams using BigFix® systematically find and deploy the right patch for each unique vulnerability identified by Qualys. In many cases, there is a communication gap between these two teams, resulting in excessive manual effort, spreadsheet errors and long windows of vulnerability. In fact, studies show that up to one-third of all detected vulnerabilities remain open after a year, and over one-quarter are never remediated. BigFix Insights for Vulnerability Remediation can reduce the time it takes for IT Operations to remediate vulnerabilities found by IT Security from days or weeks to minutes or hours. BigFix Insights for Vulnerability Remediation automatically correlates vulnerabilities discovered by Qualys with the most appropriate patch and configuration settings enabling organizations to quickly prioritize and deploy remediation actions, reducing the enterprise attack surface. Unlike other solutions. BigFix leverages the broadest set of remediation capabilities, both in terms of supported OS platforms and out of-the-box, certified remediations. BigFix Insights for Vulnerability Remediation is designed specifically for organizations who use BigFix Lifecycle, BigFix Compliance, or BigFix Remediate and who also use Qualys for vulnerability management. BigFix Remediate can resolve vulnerabilities faster... up to 96% faster!
  • 2. Speed Remediation of Vulnerabilities - How it works BigFix Insights for Vulnerability Remediation speeds remediation by automating manual processes that are commonly seen in organizations. Automated correlation of vulnerability scan data from Qualys with available Fixlets along with simple, prioritized deployment workflows from BigFix speeds remediation of endpoint vulnerabilities across the enterprise. The operational flow is: 1. A Security Operator performs a scan using Qualys to identify the vulnerabilities across the enterprise. 2. The vulnerabilities or Common Vulnerabilities and Exposures (CVE®) identified by Qualys are automatically correlated with BigFix’s comprehensive patch data using the BigFix Advanced Patch Correlation Engine. The correlation engine: a) Correlating the asset between Qualys and BigFix. b) Correlating the asset vulnerabilities between Qualys and BigFix using CVEs. c) Identifying the BigFix Fixlet that mitigates the discovered vulnerability. 3. After correlation, staff can examine the information and take action. a) Data or Security Analysts can leverage Business Intelligence Reports, drilling down into the details to better understand the vulnerabilities and potential remediations. b) BigFix Operators can leverage the Vulnerability Remediation Dashboard to see vulnerabilities that can be remediated using available BigFix Fixlets, and more importantly, immediately target and deploy remediations. Using this operational workflow, organizations using Qualys can leverage BigFix Insights for Vulnerability Remediation to dramatically reduce the remediation time, manual errors and the attack surface. HCL BigFix hcl-software.com
  • 3. A Case Study of BigFix for Insights Vulnerability Remediation Typically, an IT operations or Security specialist will spend 2-3 minutes researching the right remediation for each vulnerability. With potentially hundreds or thousands, that is a lot of time spent. BigFix Insights for Vulnerability Remediation automates this process with the Advanced Patch Correlation Engine which: What does this mean in business terms? An organization with 1,000 running vulnerabilities will spend up to 50 person-hours per assessment cycle researching and correlating available fixes to the correct assets. With BigFix Insights for Vulnerability Remediation, this time can be reduced to less than two hours by automating manual processes and reducing errors and associated rework. That is 96% less effort! IT organization can also quickly implement fixes and effectively prove compliance to auditors and executive stakeholders. With BigFix Insights for Vulnerability Remediation, IT Security and IT Operation teams can collaborate effectively to quickly remediate vulnerabilities discovered in a prioritized manner, providing significant operational and organizational value to the CIO and CISO. BigFix Insights for Vulnerability Remediation delivers signification business value by: • Aligning Security and Operations teams with intelligent automation • Compressing security vulnerability remediation times by an order of magnitude • Implementing fixes and proving compliance to all stakeholders • Reducing enterprise security risk, helping prevent cyberattacks BigFix Insights for Vulnerability Remediation Application The BigFix Insights for Vulnerability Remediation Application for Qualys provides actionable views of the correlated data from Qualys and BigFix. Each view helps IT and Security operators understand the magnitude and severity of the vulnerabilities in different ways to enable effective prioritization of remediation actions. Operators can leverage the interactive visualizations to filter and drill down to more detail associated with the correlated vulnerabilities and devices. Three Granular Views (1) Graphical overview/summary - Comprises three graphs or charts for a high-level visual overview to enable very quick prioritization across multiple contexts. The three graphs are shown in the top half of the image below and depicts: Top 10 Critical Exposures by CVE/Qualys ID - The first chart depicts the top ten critical exposures by either CVE or Qualys ID to help you quickly identify critical vulnerabilities with high exposures that can be remediated by BigFix. Vulnerabilities by Severity - The second chart depicts vulnerabilities with available Fixlets by Qualys severity score or by CVSS. Qualys’s severity score enables prioritization of vulnerabilities and the CVSS (Common Vulnerability Scoring System) is an industry standard for assessing the severity of vulnerabilities. Vulnerabilities by Date Published and Severity - The third chart augments the details provided in the Vulnerabilities by Severity chart. Specifically, this graph adds the date published (i.e. the date the vulnerability record was first added to the CVE List) for the top 10 vulnerabilities (2) Data view - Depicts vulnerabilities with available Fixlets, along with the number of affected devices in a tabular format. The data view provides the ability to search each column for a specific value, filter, or sort the values in column. The data view is shown in the bottom half of the image below. (3) Vulnerability view - From the Data view, select a specific vulnerability to view more detail including vulnerability metadata, available Fixlet content for remediation, applicable devices, and deployment statuses. hcl-software.com
  • 4. About HCLSoftware    HCLSoftware is a division of HCLTech (HCL) that operates its primary software business. It develops, markets, sells, and supports over 30 product families in the areas of Digital Transformation, Data Analytics & Insights, Al and Automation, and Enterprise Security. HCLSoftware has offices and labs around the world to serve thousands of customers. Its mission is to drive ultimate customer success with their IT investments through relentless innovation of its products. © Copyright 2023 HCL All product names, trademarks and registered trademarks are property of their respective owners hcl-software.com