Tag Archives: vulnerability management

The Scanner That Cried Wolf

Ed Bellis    January 5, 2012

Dealing with false positives during a vulnerability assessment is a fact of life. As applications and infrastructure grow larger and more complex, the likelihood of running into these Type I errors increases along with it. Although these issues become more commonplace as you grow, there are a number of known ways to help decrease the amount of false positives that are produced… Read more »

Risk I/O Joins Rapid7’s Technology Alliances

Andrea Bailiff-Gush    December 14, 2011

We are pleased to announce our recent entry into the Technology Alliances program with Rapid7. Earlier this year, Rapid7 and Risk I/O collaborated to create a simple out-of-the-box connector that pulls vulnerability scan data directly from Rapid7’s Nexpose, and uses Risk I/O to aggregate, correlate and prioritize vulnerabilities for the most effective remediation of possible security threats. Through this collaboration, Nexpose users can… Read more »

Free As In Beer!

Ed Bellis    November 16, 2011

If you’ve been on our website lately, you may have noticed that our pricing page is looking a little different. We have recently restructured our pricing plans to allow organizations of all sizes—and with all kinds of budgets—to effectively manage and secure their data using Risk I/O. We are happy to announce that we’ve adopted a “freemium” pricing model for our plans… Read more »

Ohai HP – It’s Us Again

Ed Bellis    November 4, 2011

Fresh off the heals of launching our HP Fortify connector to integrate your static analysis findings, we’d like to announce our newest connector in the family. This time from HP’s dynamic side of the house – HP WebInspect. If you’re currently using this vulnerability assessment tool as part of your application security program, you can now connect your instance into Risk… Read more »

Register for our Webinar on Risk I/O & QualysGuard Integration

Andrea Bailiff-Gush    October 25, 2011

Following on the heels of our recent integration announcement with Qualys, Risk I/O would like to invite you to our upcoming webinar, Complete Vulnerability Management with QualysGuard and Risk I/O on November 2nd @ 1 PM CDT. Led by Corey Bodzin, Direct of Product Management at Qualys, and Ed Bellis, CEO at Risk I/O, this webinar will provide an overview of the integration between… Read more »

Risk I/O Partners with Qualys Security as a Service Platform

Ed Bellis    October 12, 2011

We are pleased to announce our recent entry into the Solution & Technology Partners Program with Qualys. Qualys and Risk I/O have collaborated to create a simple out-of-the-box connector that pulls vulnerability scan data directly from QualysGuard, and uses Risk I/O to aggregate, correlate and prioritize vulnerabilities for the most effective remediation of possible security threats. Under this partnership, QualysGuard… Read more »

Rapid 7 – We Are In You

Ed Bellis    August 31, 2011

We have been crazy busy here building out additional connectors and enterprise features into Risk I/O, but wanted to take two minutes to stop and let everyone know about our newest connector. We are very excited to welcome our newest vulnerability assessment connector into the Risk I/O family – Rapid7’s NeXpose Enterprise. We wanted to thank the Rapid7 team for… Read more »

Power Search Your Way Through the Vulnerability Haystack

jheuer    August 22, 2011

We’re pleased to announce a powerful new vulnerability search architecture for Risk I/O! Users can now search and filter their vulnerabilities more easily than ever before. The heart of this new functionality is a set of filters that can be mixed-and-matched to generate the specific query that meets your needs. Individual filters can be expanded to view their possible values,… Read more »

Establishing Criteria for Vulnerability Management Solutions

Ed Bellis    August 8, 2011

Over the past several months, we have engaged with many organizations that are considering automating their vulnerability management programs.  Because many already have manual processes in place to manage their vulnerability data, they’ve been able to provide us with a tremendous amount of insight as to what functionality they deem most important in migrating to an automated vulnerability management system.Through… Read more »