Skip to main content
Connect RAD Security with vulnerability scanners and security testing tools to correlate vulnerabilities with runtime behavior and active threats.

Benefits

Runtime Context

Correlate static vulnerabilities with runtime exploitation attempts

Prioritization

Prioritize vulnerabilities based on actual exposure and exploitation risk

Unified View

See vulnerability data alongside runtime security events

Automated Response

Trigger automated responses when vulnerable components are exploited

Supported Integrations

Status: AvailableView Setup Guide →Import vulnerability findings from Qualys for comprehensive vulnerability management.Key Features:
  • Network vulnerability scans
  • Web application scanning
  • Asset discovery and inventory
  • Compliance reporting
Status: AvailableView Setup Guide →Integrate CrowdStrike Falcon Spotlight for real-time vulnerability assessment.Key Features:
  • Agent-based vulnerability detection
  • Runtime vulnerability context
  • Exploit risk scoring
  • Automated prioritization
Status: AvailableView Setup Guide →Connect with Rapid7 InsightVM for live vulnerability and risk management.Key Features:
  • Live vulnerability monitoring
  • Risk-based prioritization
  • Remediation tracking
  • Asset context integration
Status: AvailableView Setup Guide →Import vulnerability data from Tenable Vulnerability Management.Key Features:
  • Network vulnerability scans
  • VPR-based prioritization
  • Asset correlation
  • Compliance checks

Use Cases

Detect when vulnerabilities are actively being exploited in your runtime environment.RAD Security correlates vulnerability data with runtime behavior to identify exploitation attempts in real-time.
Identify and prioritize vulnerabilities based on actual exposure.Focus remediation efforts on vulnerabilities in components that are actively used and exposed to attacks.
Verify vulnerability remediation in running systems.Ensure patched vulnerabilities are no longer exploitable in production environments.
Prioritize vulnerabilities by combining severity with runtime risk factors.Consider factors like active exploitation, network exposure, and privilege escalation potential.

Getting Started

1

API Access

Obtain API credentials from your vulnerability scanner
2

Configure Integration

Add the vulnerability integration in RAD Security’s Data Sources
3

Map Assets

Ensure assets are properly mapped between systems
4

Review Findings

View correlated vulnerability and runtime data

Next Steps