Learn Search

Search across all Learn content

← Back to Case Studies

Vulnerability Management Transformation for the World’s Biggest Online Betting Exchange

Challenge

The Case in Point

Introduction

Despite using a well-known vulnerability management solution, Betfair discovered that 30–40% of its endpoints were not being patched, a massive security risk hidden behind manual tagging processes and limited vulnerability visibility.

Their existing tool, Qualys, had slower scan times, legacy risk prioritization methods, a smaller proprietary vulnerability database, and required devices to be manually assigned to patching groups, which meant that any untagged machine was effectively invisible to the patching engine. Qualys offered limited automation, and lacked visibility into vulnerability and patching status, creating security blind spots.

This inefficiency left large portions of the infrastructure vulnerable to exploitation, with no real-time insight into what was patched and what wasn’t. The operational burden was high, and the risk even higher.

That’s when Betfair made a strategic decision to replace Qualys with SecPod Saner CVEM, a unified, automated vulnerability management platform that delivered complete patch coverage, including rapid, continuous vulnerability assessment.

Replacing Qualys with Saner CVEM

Choose Saner CVEM

The switch delivered seamless onboarding, real-time vulnerability and patch visibility, and complete endpoint risk remediation.

Before and After: The Transformation

Comparing FactorsWith Qualys (Before)With Saner CVEM (After)
Vulnerability DetectionSlower scans, periodic updates5-minute scans, continuous updates
Integration between VM and PMMinimalSeamless and unified
VM database sizeSmaller, proprietary database190,000+ security checks (largest in industry)
Patch Coverage60–70% of devices100% coverage
Device OnboardingManual tagging neededFully automated
VisibilityUnclear patch statusReal-time actionable dashboard for continuous tracking
Operational EffortHigh manual effortMinimal intervention
Security PostureUnpatched endpoints left vulnerableEvery device protected

Why Qualys Fell Short

  1. Siloed Approach to Vulnerability and Patch Management:
    1. Manual correlation required between detected vulnerabilities and available patches.
    2. No automatic remediation mapping, meaning IT teams had to research and validate patch applicability manually.
    3. Increased risk of delayed remediation and incomplete fixes due to disconnect between detection and action.
  2. Limited Vulnerability Intelligence:
    1. Vulnerability assessments were not real-time and relied on less frequent database updates.
    2. Assessments were periodic rather than continuous, creating windows of undetected exposure.
    3. Without real-time detection, emerging vulnerabilities often went unnoticed until the next scheduled scan.
  3. Manual, Tag-Based Patching Process:
    1. Required IT teams to manually assign tags to devices before patching.
    2. Devices without tags remained unpatched indefinitely.
    3. High risk of security gaps and compliance failures.
  4. No Automated Device Allocation:
    1. New devices weren’t automatically assigned to patching groups.
    2. Many devices sat unassigned, missing critical security updates.
  5. Rigid Patching Cycles:
    1. No flexibility for teams like Customer Support, who needed controlled patching schedules.
    2. Lack of customization meant teams couldn’t align patching with business operations.
  6. High Operational Overhead:
    1. Routine tasks such as tagging devices, assigning patch cycles, and managing patch groups were manual and repetitive.
    2. Manual processes slowed down overall security operations.
  7. Poor Visibility and Reporting:
    1. IT teams had no clear view of which devices were patched and which were not.
    2. Difficult to track, audit, and optimize patching workflows.
    3. Inability to get detailed insights on patch metrics.

Solution

How Saner CVEM Transformed the Vulnerability Management Process

Saner CVEM offered a proactive and comprehensive approach to vulnerability management. By detecting and assessing vulnerabilities continuously, the platform ensured that the patches were deployed and applied in a timely manner. It allowed them to remediate vulnerabilities quickly and helping them implement a continuous vulnerability management strategy that can adapt to changing needs.

  1. Faster Detection and Assessment:

    High-speed 5-minute scans powered by the world’s largest vulnerability database to assess vulnerabilities rapidly.
  2. Continuous Visibility:

    Unified dashboard for instant tracking of vulnerability and patch status across all devices.
  3. Automated Patching Policy:

    Devices automatically onboarded and assigned to cycles.
  4. 100% Endpoint Targeting:

    No device is left unpatched.
  5. Custom Patch Scheduling:

    Teams like Customer Support get controlled patching timelines.
  6. Detailed Patch Metrics:

    Track detailed insights into patching metrics with auto-generated reports and an inbuilt audit log.
  7. Easy Security Compliance:

    Unified view of patch compliance to address deviations from compliance standards.

Key Benefits

  • Clarity on types of vulnerabilities.
  • Zero patch failures.
  • Operational flexibility.
  • Faster remediation.
  • Low overheads.
  • Hands-free automation.
  • No business downtime.
  • Stronger security posture.

Testimonial

“It is a pretty easy-to-use tool when it comes to automation. You don’t have to go through hundreds of options or hundreds of menus to be able to dig that patching task. I can quickly start my day, look at the cyber hygiene score, and ensure it is up to the expected mark. I clearly know what needs to be addressed and can quickly remediate it. It is much easier. I can get the patching job done in just a few clicks.”

- Tech Support Manager


SecPod | Prevent Cyberattacks