Category Archives: Vulnerability Management

Register for our Webinar on Risk I/O & QualysGuard Integration

Andrea Bailiff-Gush    October 25, 2011

Following on the heels of our recent integration announcement with Qualys, Risk I/O would like to invite you to our upcoming webinar, Complete Vulnerability Management with QualysGuard and Risk I/O on November 2nd @ 1 PM CDT. Led by Corey Bodzin, Direct of Product Management at Qualys, and Ed Bellis, CEO at Risk I/O, this webinar will provide an overview of the integration between… Read more »

Risk I/O Partners with Qualys Security as a Service Platform

Ed Bellis    October 12, 2011

We are pleased to announce our recent entry into the Solution & Technology Partners Program with Qualys. Qualys and Risk I/O have collaborated to create a simple out-of-the-box connector that pulls vulnerability scan data directly from QualysGuard, and uses Risk I/O to aggregate, correlate and prioritize vulnerabilities for the most effective remediation of possible security threats. Under this partnership, QualysGuard… Read more »

SAST And DAST Like Peanut Butter and Jelly

Ed Bellis    October 3, 2011

Today, our development team added HP Fortify integration with Risk I/O. HP Fortify is a static analysis tool that looks at the source code of an application to identify security flaws within. Fortify’s Static Application Security Testing (SAST) results provide an inside-out view of the vulnerabilities that exist in a software program compared to Dynamic Application Security Testing (DAST) that… Read more »

Our Newest Addition Is Big & Blue

Ed Bellis    September 23, 2011

Our Risk I/O family keeps growing. Today, we added yet another connector to the already growing list of vulnerability assessment connectors in our family. We are very excited to welcome IBM’s AppScan as our newest addition! With our newest connector, you can now integrate directly within your AppScan vulnerability scanner. This empowers you to scan applications, identify vulnerabilities, and generate… Read more »

Power Search Your Way Through the Vulnerability Haystack

jheuer    August 22, 2011

We’re pleased to announce a powerful new vulnerability search architecture for Risk I/O! Users can now search and filter their vulnerabilities more easily than ever before. The heart of this new functionality is a set of filters that can be mixed-and-matched to generate the specific query that meets your needs. Individual filters can be expanded to view their possible values,… Read more »

Help Us Build our Roadmap for a Chance at a Free 1-Year Subscription!

Ed Bellis    August 15, 2011

Let’s face it, the greatest value that Risk I/O delivers is the ability to connect into your vulnerability assessment tools so that you can easily manage and monitor all of security vulnerabilities and defects. We believe that the assessment tools, static and binary analysis tools, trouble ticketing and bug-tracking tools that Risk I/O is compatible with should align as closely… Read more »

Establishing Criteria for Vulnerability Management Solutions

Ed Bellis    August 8, 2011

Over the past several months, we have engaged with many organizations that are considering automating their vulnerability management programs.  Because many already have manual processes in place to manage their vulnerability data, they’ve been able to provide us with a tremendous amount of insight as to what functionality they deem most important in migrating to an automated vulnerability management system.Through… Read more »