throbber
Case 4:18-cv-07229-YGR Document 202-7 Filed 06/01/21 Page 1 of 7
`Case 4:18-cv-07229—YGR Document 202-7 Filed 06/01/21 Page 1 of 7
`
`EXHIBIT 13
`
`EXHIBIT 13
`
`

`

`Case 4:18-cv-07229-YGR Document 202-7 Filed 06/01/21 Page 2 of 7
`Case 4:18-cv-07229—YGR Document 202-7 Filed 06/01/21 Page 2 of 7
`
`@ Quolys.
`
`Qualys VMDR® — All-in-One
`
`Vulnerability Management, Detection,
`
`and Response
`
`The #i Vulnerability Management solution expands
`
`to establish a new, game—changing category
`
`Discover, assess, prioritize, and patch critical
`
`vulnerabilities in real time and across your global
`
`hybrid-IT landscape — all from a single solution.
`
`
`
`VMDR with Built-in
`
`Orchestration
`
`Identify all known and unknown
`
`- assets on your global hybrid-IT
`
`Knowing what’s active in a global hybrid~IT environment is
`
`fundamental to security. Automatically detect all known
`
`and unknown IT assets everywhere for a complete,
`
`categorized inventory enriched with details such as vendor
`
`lifecycle information and much more.
`
`Analyze vulnerabilities and
`
`misconfigurations with six sigma
`
`accuracy
`
`Automatically detect vulnerabilities and critical
`
`misconfigurations per CIS benchmarks, by asset.
`
`Quickly focus on what’s most urgent
`
`Using advanced correlation and machine learning,
`
`automatically prioritize the riskiest vulnerabilities on the
`
`most critical assets, reducing thousands of vulnerabilities
`
`to the few hundred that matter.
`
`Innoculate your assets from the most
`
`critical threats
`
`With the push of a button, deploy the most relevant,
`
`superseding patch to quickly remediate vulnerabilities and
`
`threats across any size environment.
`
`HIGHLY CONFIDENTIAL — ATTORNEYS' EYES ONLY
`
`QUALYSOOBOBBBS
`
`

`

`Case 4:18-cv-07229-YGR Document 202-7 Filed 06/01/21 Page 3 of 7
`Case 4:18-cv-07229—YGR Document 202-7 Filed 06/01/21 Page 3 of 7
`
`Today’s processes involve different teams, using multiple
`point solutions — significantly adding complexity and time
`to the critical patching process.
`
`Traditional endpoint solutions don’t interface well with each other, creating integration headaches, false
`
`positives, and delays. Ultimately, devices are left unidentified, critical assets are misclassified,
`
`vulnerabilities are poorly prioritized, and patches don't get fully applied.
`
`A new approach is required.
`Introducing
`
`
`
`VMDR
`
`A single app for discovery,
`assessment, detection and
`
`response.
`
`Benefits:
`
`The Qualys Cloud Platform, combined with its powerful
`
`It's all in the cloud
`
`lightweight Cloud Agents, Virtual Scanners, and Network
`
`Analysis (passive scanning) capabilities bring together all
`
`' @
`
`No need for bulky appliances. Everything is in
`
`the cloud and ready to run.
`
`four key elements of an effective vulnerability management
`
`Easy to deploy
`
`program into a single app unified by powerful out-of-the-
`
`Deployment is incredibly simple. With
`
`box orchestration workflows. Qualys VMDR® enables
`
`organizations to automatically discover every asset in their
`
`unlimited virutal scanners, you can spin a
`
`scanner up and be ready to go in not time.
`
`environment, including unmanaged assets appearing on the
`
`Includes vulnerability management
`
`network; inventory all hardware and software; and classify
`
`and tag critical assets. VMDR continuously asseses these
`
`assets for the latest vulnerabilities, and applies the latest
`
`threat intel analysis to prioritize actively exploitable
`
`VM
`
`VMDR has the same vulnerability management
`
`capabilities you know and trust.
`
`Drastically reduce time and money
`
`A single cloud platform saves organizations
`
`vulnerabilities. Finally, VMDR automatically detects the
`
`save significant resources and the time
`
`latest superseding patch for the vulnerable asset and easily
`
`deploys it for remediation.
`
`Built-in orchestration
`
`By delivering all this in a single app workflow, VMDR
`
`automates the entire process and significantly accelerates
`
`an organization’s ability to respond to threats, thus
`
`preventing possible exploitation.
`
`otherwise required to install multiple agents
`
`and consoles, and work on integrations.
`
`HIGHLY CONFIDENTIAL — ATTORNEYS' EYES ONLY
`
`QUALYSOOBOSBSG
`
`

`

`Case 4:18-cv-07229-YGR Document 202-7 Filed 06/01/21 Page 4 of 7
`Case 4:18-cv-07229—YGR Document 202-7 Filed 06/01/21 Page 4 of 7
`
`ASSET MANAGEMENT
`
`VULN ERABl LlTY MANAGEM ENT
`
`Auomated asset identificaton
`
`and categorization
`
`Real—time vulnerability and
`
`misconfiguration detection
`
`Knowing what’s active in a global hybrid—IT environment is
`
`VMDR enables customers to automatically detect vulnerabilities and
`
`fundamental to security. VMDR enables customers to automatically
`
`critical misconfigurations per CIS benchmarks, broken out by asset.
`
`discover and categorize known and unknown assets, continuously
`
`Misconfigurations lead to breaches and compliance failures, creating
`
`identify unmanaged assets, and create automated workflows to
`
`vulnerabilities on assets without common vulnerabilities and
`
`manage them effectively.
`
`After the data is collected, customers can instantly query assets and
`
`any attributes to get deep visibility into hardware, system
`
`configuration, applications, services, network information, and more.
`
`exposures (CVEs). VMDR continuously identifies critical
`
`vulnerabilities and misconfigurations on the industry's widest range
`
`of devices, operating systems and applications.
`
`
`
`
`
`THREAT PRIORITIZATON
`
`PATCH MANAGEMENT
`
`Automated remediation prioritization
`
`Patching and remediation at your
`
`VMDR uses real-time threat intelligence and machine learning
`
`models to automatically prioritize the riskiest vulnerabilities on the
`
`most critical assets. Indicators such as Exploitable, Actively Attacked,
`
`and High Lateral Movement bubble up current vulnerabilities that are
`
`at risk while machine learning models highlight vulnerabilities most
`
`likely to become severe threats, providing multiple levels of
`
`prioritization.
`
`fingertips
`
`After prioritizing vulnerabilities by risk, VMDR rapidly remediates
`
`targeted vulnerabilities, across any size environment, by deploying the
`
`most relevant superseding patch. Additionally, policy—based,
`
`automated recurring jobs keep systems up to date, providing proactive
`
`patch management for security and non-security patches. This
`
`significantly reduces the vulnerabilities the operations team has to
`
`chase down as part of a remediation cycle.
`
`
`
`
`
`Confirm and repeat
`
`VMDR closes the loop and completes the vulnerability management
`
`lifecycle from a single plane of glass that offers real—time
`
`customizable dashboards and widgets with built-in trending. Priced
`
`on a per-asset basis and with no software to update, VMDR
`
`drastically reduces your total cost of ownership.
`
`451
`
`“With VMDR, Qualys integrates highly valued and much-needed
`asset visibility with vulnerability management so that IT teams
`can have full visibility of their global IT assets (known and
`unknown). This provides the ability to identify the exposures of
`those assets in real time, and to prioritize remediation by
`combining real-time threat indicators with asset context to
`remediate with one click and then audit the process.”
`
`
`
`.514
`
`Scott Crawford
`
`Research Vice President at 451 Research
`
`HIGHLY CONFIDENTIAL — ATTORNEYS' EYES ONLY
`
`QUALYSOOBOSBST
`
`

`

`Case 4:18-cv-07229-YGR Document 202-7 Filed 06/01/21 Page 5 of 7
`Case 4:18-cv-07229—YGR Document 202-7 Filed 06/01/21 Page 5 of 7
`
`Screenshot: VMDR Prioritization Report
`
`VMDR includes a new threat prioritization engine. It correlates multiple real-time threat indicators (RTIs) with new
`
`machine learning models that analyze historic trends and current threats, and combine with asset criticality, to
`
`accurately pinpoint only the small number of highly potent threats that, once remediated, significatly reduce an
`
`organization's risk. Instant workflow that kicks off patching with Qualys Cloud Agents further reduces risk by
`
`eliminating the huge gap that traditional, siloed tools insert between detection and patch deployment.
`
`@ Qualys.
`
`Qualys Threat Prioritization
`ASSETS
`
`Tags
`
`I Finance
`
`I Marketing
`
`I Human Resources
`
`Engineering
`
`I Operations
`
`VMDR
`
`Hosts
`
`CVSS Score —l -
`
`High
`(31 D)
`
`.‘2
`
`_
`
`.
`
`Med
`(320)
`
`Low
`(713)
`
`Total
`
`Vulnerabilities
`
`Service Level
`
`Agreement
`
`
`Pre—SLA
`D-15+ Days
`16-30 Days
`31-60 Days
`61-90 Days
`90+ Days
`(260)
`(122)
`(108)
`(412)
`(21 1)
`(230)
`
`Zero Day
`
`High Lateral Movement
`
`Active Attacks
`
`0 High Data Loss
`
`Easily Exploitable
`
`Unpatchable
`
`Machine Learning Probability o Exploit Kit Available
`
`.fiJ-ET'.
`r
`=.....-'
`
`1,2113? DOS External
`
`Vulnerable to DOS
`
`Public Exploit
`
`e Wormable
`
`Prioritized Vulnerabilities
`
`Deploy Patches
`
`3T
`
`of 1.3K
`
`II
`
`5
`
`9
`
`on 38 hosts
`
`2.75 /0 of Total Vulnerabilities
`
`0
`
`On 1 0 /0 of total Hosts
`
`0
`
`OID
`
`[IVE
`
`TITLE
`
`PRIDRITIZATIDN SCORE
`
`HOSTS
`
`91534
`
`CVE—2019—0708
`
`Microsoft Windows Remote Desktop Services Remote Code Execution...
`
`23
`
`Patch
`
`371361
`
`CVE-2018-1 5982
`1 more
`
`Adobe Security Update for Flash Player (APSB18-42)
`
`
`
`19
`
`Patch
`
`90694
`
`CVE—2019-0708
`2 more
`
`Microsoft Windows Cumulative Security Update of ActiveX Kill Bits (M..
`
`28
`
`Patch
`
`HIGHLY CONFIDENTIAL — ATTORNEYS' EYES ONLY
`
`QUALYSOOBOBBSB
`
`

`

`Case 4:18-cv-07229-YGR Document 202-7 Filed 06/01/21 Page 6 of 7
`Case 4:18-cv-07229—YGR Document 202-7 Filed 06/01/21 Page 6 of 7
`
`Screenshot: VMDR Filters
`
`Use highly responsive dynamic filters, powered by the Qualys highly scalable elastic backend, to create powerful
`
`visualizations that accurately pinpoint various threats across millions of assets in your global hybrid network.
`
`Quickly view your network from different lenses and build powerful, highly customized dashboards.
`
`'_,;_4;.,_;
`
`V
`
`.-'
`
`Ir!
`
`.- I. [-..I_J;.I
`
`.{'_;|::'- Y
`
`:."'|. ..|,-.|.; ll '40"
`
`y
`
`:
`
`.-.,.,I :.'-".?I
`
`V
`
`.J
`
`-
`
`‘._I_.l_-.[_.
`
`v
`
`"-‘I'!'.'.I|.- Liv
`
`'.~..:_|»-:=
`
`Y
`
`-_'il:'I' fir
`
`.
`
`.I1---,_-I|:;'-': -'
`
`:3ll' V
`
`I'_.--.:..-I.'.I.'- ll -__4I]jI
`
`v
`
`I 1-0..
`
`I]'."_'I
`
`v
`
`"3
`
`I‘.-'-.:':I--
`
`r
`
`i." '?-v"-':_II-:I'I for assets
`
`TotaIAssets
`
`CD
`
`.
`
`.
`
`I
`
`-
`
`I
`
`- _'
`
`-
`
`'
`
`-
`
`I
`
`I
`
`Totalnssets
`
`G)
`
`.
`
`'
`
`i.
`
`'
`
`I
`
`I
`
`.
`
`' . I
`
`-
`
`_
`
`.— i AND
`
`CRITERIA
`OR
`.10 «r»
`I-rI'lI'uInerabil'Ities
`
`@5
`
`WI'Mlsnunfigs
`
`«c»
`
`s
`
`
`
`1.
`
`'
`
`~
`
`_
`
`.-
`
`.
`
`SRVUOitZ-PRD
`
`I
`
`_
`
`.
`
`.
`
`"- .
`
`-'
`
`'
`
`,
`
`.-
`
`..
`
`.
`
`.
`
`.
`
`_
`
`f
`
`.'
`
`.
`
`-
`
`_
`
`.-
`
`I
`
`-'
`10.10.?004
`
`_.
`
`AND
`
`a
`
`
`
`-
`
`.
`
`.
`
`"I;
`
`_.
`
`SWUOf-Z-PRD
`
`
`
`:-
`
`-
`
`SWDGSEI-PRD
`_
`.
`_
`
`I
`
`'
`
`__ _.
`
`.
`
`.'
`
`-
`
`I
`_
`DEGDESd—PRD
`
`.-
`
`I.
`
`O4
`wflhreals
`
`'-
`
`-
`
`CRITERIA
`os_
`010 «r»
`IIrNulnerahililles
`@5
`wl‘MlscurIfigs
`04 «w
`wflhreats
`
`-
`.
`.
`._ _

`WEBUDQUAPRD _
`- .._...
`.
`EWUUEPRD
`
`. ©
`1010.70.14
`'
`
`-
`-
`-
`-@ I
`
`- NTwoniaas
`
`
`
`O
`
`
`
`-- mesons-900
`
`.
`
`.
`
`--
`
`'
`
`.
`
`'
`
`SDDO789—1EJEI
`
`
`
`'iallnpoms-Pso'
`
`_ _
`
`3000345100 "'
`
`.
`
`1:1 Assets
`
`v
`
`with Tags
`
`Pod1
`
`FedRAMP e
`
`‘11 Search for assets
`
`at:
`
`.i.
`
`{,5}
`
`A
`
`Last 30 days
`
`Grotto By
`
`Select
`
`7
`
`Filler 9‘;
`
`Enterprise H Kim Y
`
`Lorpmste IT {40'}
`
`v
`
`Cloud {22'}
`
`Y
`
`Soltwsres
`
`Y
`
`:‘.:1
`
`I
`
`.
`
`I. --- """"""""
`II
`
`....... —---‘
`
`_.-"‘
`
`.-’_
`
`.-'
`
`>.
`'
`
`.'
`
`_.
`
`I
`4—_—'-‘
`
`.
`
`'.
`
`.
`
`I
`
`80
`Total Assets
`
`CRITERIA
`
`0R
`
`. 10
`

`
`AND
`
`l
`
`<o>
`_.
`
`<0)
`
`@ 5
`w/M'iscunfigs
`
`'
`
`V
`
`4
`
`a
`
`III/Threats
`
`I
`I
`".
`
`.k
`
`/.
`
`‘
`
`E’L-l __,:._--__-j'.'.—-
`_
`
`’
`
`’_.
`
`_,.—
`
`___--"
`_.
`
`_-'
`
`_,-"
`'.
`
`.‘
`
`;
`
`..
`
`,
`
`.l ;
`
`l
`
`F‘—
`
`‘_
`SRVOOfQ—PRD
`_ _.
`_=:_/_le.--
`APP0045—PRD
`Server
`
`Dell lnc./OptiPlex 990
`
`.
`
`.- o ms
`
`-
`-
`
`Pod 1
`
`FedRAMP
`
`
`
`View all 14Tags
`
`LmSIulflhounlgn‘imsIu-n
`
`'
`
`'
`
` Wmiabi'mes
`Cmnccsed I'IDrrI 10.31 II
`
`2"“
`
`' “a“;
`, IE_ _,
`_ APPOUgS-PRBRW
`'l
`
`10 VULNERABILITIES
`7 Severity 5
`3 Seventy4
`
`04 MISBDNFIGURATIDNS
`1 Critical
`3 Hugh
`
`06 THREATS
`2 Wormable
`4 Exploutable
`
`PATCH
`
`REMEDIATE
`
`REMOVE
`
`Ir
`
`
`
`'1.“ “a."
`
`—
`
`HIGHLY CONFIDENTIAL - ATTORNEYS' EYES ONLY
`
`QUALY300606869
`
`

`

`Case 4:18-cv-07229-YGR Document 202-7 Filed 06/01/21 Page 7 of 7
`Case 4:18-cv-07229—YGR Document 202-7 Filed 06/01/21 Page 7 of 7
`
`Qualys VMDR® — See for yourself
`
`Priced on a per-asset basis, VDMR saves on deployment, administration, and software subscription
`
`costs with lightweight, easily deployed, and self-updating Cloud Agents and Virtual Scanners.
`
`Request a full trial (unlimited scope) at qualys.com/trial
`
`Apps and services
`
`What it does
`
`ASSET MANAGEMENT
`
`papnnur
`
`uoppv
`
`Asset Discovery
`
`Detect and inventory all known and unknown assets that connect to your global hybrid—
`
`IT environment — including on premises devices and applications, mobile, endpoints. clouds,
`
`containers, OT and loT. Includes Qualys Passive Scanning Sensors.
`
`Asset Inventory
`
`Get up~toédate real—time inventory for all IT assets. VMDR includes:
`
`On-premises Device Inventory — Detect all devices and applications connected to the network
`
`including servers, databases, workstations, routers, printers, IoT devices, and more.
`
`Certificate Inventory — Detect and catalog all TLS/SSL digital certificates (internal and external
`
`facing) from any Certificate Authority.
`
`Cloud Inventory — Monitor users, instances, networks, storage, databases and their
`
`relationships for a continuous inventory of resources and assets across all public cloud platforms.
`
`Container Inventory — Discover and track containers hosts and their information — from build
`
`to runtime.
`
`VMDR includes unlimited Qualys Cloud Agents and Container Sensors. Discoverandinventoryallassets
`
`
`(fl
`
`Mobile Device Inventory — Detect and catalog every mobile device. with extensive information
`
`about the device, its user, its configuration. and its apps.
`
`Asset Categorization and
`Normalization
`
`Gather detailed information, such as an assets' details, running services, installed software, and
`more. Eliminate the variations in product and vendor names and categorize them by product
`
`families on all assets.
`
`Enriched Asset Information
`
`Get advanced in—depth details including, hardware/software lifecycles (EOL/EOS), software
`
`license auditing. commercial and open sources licenses, and more.
`
`CMDB Synchronization
`
`Bi—dire‘ctionally synchronize asset information between Qualys and the ServiceNow CMDB.
`
`VULNERABILITY MANAGEMENT
`
`Vulnerability Management
`
`Continuously detect software vulnerabilities with the most comprehensive signature database,
`
`across the widest range of asset categories. Qualys is the market leader in VM.
`
`Includes unlimited Qualys Virtual Scanners and Cloud Agents
`
`Configuration Assessment
`
`Assess, report and monitor security—related misconfiguration issues based on the Center for
`Internet Security (CIS) benchmarks.
`
`Additional Assessment
`Add 0'15
`
`Certificate Assessment - Detect and catalog every TLS/SSL digital certificates (internal and
`external facing) from any Certificate Authority.
`Cloud Security Assessment — Continuously monitor and assess your PaaS/laaS resources for
`
`misconfigurations and non—standard deployments.
`
`Container Security Assessment a Scan images in your environment for high~severity
`
`vulnerabilities, unapproved packages and older or test release tags. and assess their impact.
`
`Includes plug»ins for Cl/CD tools such as Jenkins, and others.
`
`4.!
`
`3
`9
`'o
`E
`g
`
`
`
`Detectandprioritizethreats
`
`.C
`U
`
`3
`2
`
`in
`3
`fig
`
`or
`E
`(1:
`0:
`
`THREAT DETECTION 8: PRIORITIZATION
`
`Continuous Monitoring
`
`network changes before they turn into breaches.
`
`
`
` Alerts you in real time about network irregularities. Identifies threats and monitors unexpected
` Pinpoint your most critical threats and prioritize patching. Using real—time threat intelligence and
`
`
`
`
`Threat Protection
`
` RESPONSE
`
`machine learning, take control of evolving threats, and identify what to remediate first.
`
`Patch Detection
`
`Automatically correlate vulnerabilities and patches for specific hosts. decreasing your
`
`remediation response time. Search for CVEs and identify the latest superseding patches.
`
`
`—
`
`
`
`Patch Management via Third-
`Party VBHdOI'S
`
`Integrates with your existing patch deployment solutions, like SCCM and other third+party
`solutions. to significantly reduce patch time.
`
`Patch Management via
`QUBIYS CIOUd Agents
`
`Speed up patch deployment by eliminating dependence on third~party patch deployment
`solutions by using Qualys Cloud Agents.
`
`Container Runtime
`.
`.
`Protection
`
`
`Protect and secure running containers for policy enforcement. (Available 01 2020 Beta)
`
`
`
`Mobile Device Management - Remotely monitor, manage and secure mobile devices. (Available QZ 2020 Beta)
`
`
`
`GUALYS SENSORS WITH UNPRECEDENTED SCALABILITY
`
`VMDR includes, UNLIMITED: Qualys Virtual Passive Scanning Sensors (for discovery), Qualys Virtual Scanners, Qualys Cloud
`
`Agents, Qualys Container Sensors, and Qualys Virtual Cloud Agent Gateway Sensors for bandwidth optimization.
`
`
`
`OTHER INTEGRATED QUALYS CLOUD APP ADD ONS
`
`Indication of Compromise, Container Security, Web Application Scanning, Web Application Firewall, Policy Compliance, PCI Compliance,
`
`File Integrity Monitoring, Security Assessment Questionnaire and Out-of—Band Configuration Assessment.
`
`For more information about these apps, visit oualyscom/apps
`
`
`is?“ Qualys. Inc. All rights reserved
`
`HIGHLY CONFIDENTIAL - ATTORNEYS' EYES ONLY
`
`QUALYSOOBOBBTO
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket