Benefits
Runtime Context
Correlate static vulnerabilities with runtime exploitation attempts
Prioritization
Prioritize vulnerabilities based on actual exposure and exploitation risk
Unified View
See vulnerability data alongside runtime security events
Automated Response
Trigger automated responses when vulnerable components are exploited
Supported Integrations
Qualys
Qualys
Status: AvailableView Setup Guide →Import vulnerability findings from Qualys for comprehensive vulnerability management.Key Features:
- Network vulnerability scans
- Web application scanning
- Asset discovery and inventory
- Compliance reporting
CrowdStrike Falcon Spotlight
CrowdStrike Falcon Spotlight
Status: AvailableView Setup Guide →Integrate CrowdStrike Falcon Spotlight for real-time vulnerability assessment.Key Features:
- Agent-based vulnerability detection
- Runtime vulnerability context
- Exploit risk scoring
- Automated prioritization
Rapid7 InsightVM
Rapid7 InsightVM
Status: AvailableView Setup Guide →Connect with Rapid7 InsightVM for live vulnerability and risk management.Key Features:
- Live vulnerability monitoring
- Risk-based prioritization
- Remediation tracking
- Asset context integration
Tenable VM
Tenable VM
Status: AvailableView Setup Guide →Import vulnerability data from Tenable Vulnerability Management.Key Features:
- Network vulnerability scans
- VPR-based prioritization
- Asset correlation
- Compliance checks
Use Cases
Exploit Detection
Exploit Detection
Detect when vulnerabilities are actively being exploited in your runtime environment.RAD Security correlates vulnerability data with runtime behavior to identify exploitation attempts in real-time.
Attack Surface Reduction
Attack Surface Reduction
Identify and prioritize vulnerabilities based on actual exposure.Focus remediation efforts on vulnerabilities in components that are actively used and exposed to attacks.
Compliance Validation
Compliance Validation
Verify vulnerability remediation in running systems.Ensure patched vulnerabilities are no longer exploitable in production environments.
Risk-Based Prioritization
Risk-Based Prioritization
Prioritize vulnerabilities by combining severity with runtime risk factors.Consider factors like active exploitation, network exposure, and privilege escalation potential.
Getting Started
1
API Access
Obtain API credentials from your vulnerability scanner
2
Configure Integration
Add the vulnerability integration in RAD Security’s Data Sources
3
Map Assets
Ensure assets are properly mapped between systems
4
Review Findings
View correlated vulnerability and runtime data