3. Continuous Monitoring
Delivers a comprehensive, always-on view of
potential security holes, enabling organizations to
immediately identify and proactively address
potential threats before they turn into breaches.
Uses elastic scanning capacity to catch unexpected hosts, expiring
SSL certificates, open ports, severe vulnerabilities and undesired
applications. Helps organizations identify the highest priority issues
to enable fast and efficient mitigation and remediation.
Vulnerability Management
Automates the lifecycle of network auditing and
vulnerability management across your global
business. Gives you visibility into IT systems
across your network, how they might be
vulnerable to the latest Internet threats, and how to protect them.
Policy Compliance
Helps organizations pass security audits and
document compliance tied to corporate security
policies, laws and industry regulations,
supporting the requirements of both internal and
external auditors. Audits the configurations of your computers to see
if they are enforcing password controls and other compliance
policies.
Questionnaire Service
Centralizes and automates the gathering of risk
data and compliance evidence from employees,
partners, vendors and other subject matter
experts. Frees organizations from manual,
labor-intensive approaches (such as email and spreadsheets) so that
all phases of their assessment programs can be managed efficiently
and reliably online.
PCI Compliance
Provides small and medium-sized businesses with
enterprise-level scanning and reporting that’s
easy to implement and maintain. Enables large
corporations to meet PCI compliance
requirements for data protection on a global scale.
Web Application Scanning
Automatically discovers and catalogs all of your
web applications and continuously performs
comprehensive, accurate scans to uncover critical
vulnerabilities such as SQL injection, Cross-Site
Scripting, and website misconfigurations. It then automatically
notifies the Qualys Web Application Firewall to deploy virtual patches
so you can stop web attacks and prevent data breaches.
Web Application Firewall
Allows organizations to monitor all web pages
visited by users and automatically share this
information back to the Web Application Scanner
ensuring that no page is missed. By tightly
integrating the scan and the firewall, you can quickly block attacks on
web app vulnerabilities, prevent disclosure of sensitive information,
and control where and when your applications are accessed.
SECURE Seal
Enables online businesses of all sizes to scan their
websites for the presence of malware, network
and application vulnerabilities, as well as SSL
certificate validation. Once a website passes all
four security scans, the service generates a Qualys SECURE seal for
the merchant to display on their web site, demonstrating to visitors
that the company is committed to security.
VMVM
PCPC
QSQS
CMCM
PCIPCI
WASWAS
WAFWAF
Integrated Suite of Security & Compliance Solutions
New Security Services
Qualys plans to introduce new services in 2015 that will help organiza-
tions achieve continuous security including: Advanced Malware
Protection to detect and protect against advanced persistent threats,
and Log Management and Analytics for real time advanced analytics
and intelligence. Additionally, Qualys will expand its Policy Compliance
offering with a Customizable Questionnaire service to automate the
gathering of risk data.
Free Security Tools
BrowserCheck – https://browsercheck.qualys.com
SSL Secure Website Test – https://www.ssllabs.com/ssltest
FreeScan Vulnerability Scan – https://www.qualys.com/freescan
Top 4 Security Controls Audit – https://www.qualys.com/top4
Patch Tuesday PC Audit – https://www.qualys.com/patchtuesday
Qualys Cloud Platform & Integrated Suite
of Security & Compliance Solutions
ASSET
DISCOVERY
Find & organize hosts & web apps on a global scale
NETWORK
SECURITY
Identify & protect against proliferating security threats
WEB APP
SECURITY
Find, shield & fix vulnerabilities in your web apps
THREAT
PROTECTION
Harden your IT systems and web applications
COMPLIANCE
MONITORING
Make compliance faster, more efficient & more reliable
4. Continuous Monitoring
Delivers a comprehensive, always-on view of
potential security holes, enabling organizations to
immediately identify and proactively address
potential threats before they turn into breaches.
Uses elastic scanning capacity to catch unexpected hosts, expiring
SSL certificates, open ports, severe vulnerabilities and undesired
applications. Helps organizations identify the highest priority issues
to enable fast and efficient mitigation and remediation.
Vulnerability Management
Automates the lifecycle of network auditing and
vulnerability management across your global
business. Gives you visibility into IT systems
across your network, how they might be
vulnerable to the latest Internet threats, and how to protect them.
Policy Compliance
Helps organizations pass security audits and
document compliance tied to corporate security
policies, laws and industry regulations,
supporting the requirements of both internal and
external auditors. Audits the configurations of your computers to see
if they are enforcing password controls and other compliance
policies.
Questionnaire Service
Centralizes and automates the gathering of risk
data and compliance evidence from employees,
partners, vendors and other subject matter
experts. Frees organizations from manual,
labor-intensive approaches (such as email and spreadsheets) so that
all phases of their assessment programs can be managed efficiently
and reliably online.
PCI Compliance
Provides small and medium-sized businesses with
enterprise-level scanning and reporting that’s
easy to implement and maintain. Enables large
corporations to meet PCI compliance
requirements for data protection on a global scale.
Web Application Scanning
Automatically discovers and catalogs all of your
web applications and continuously performs
comprehensive, accurate scans to uncover critical
vulnerabilities such as SQL injection, Cross-Site
Scripting, and website misconfigurations. It then automatically
notifies the Qualys Web Application Firewall to deploy virtual patches
so you can stop web attacks and prevent data breaches.
Web Application Firewall
Allows organizations to monitor all web pages
visited by users and automatically share this
information back to the Web Application Scanner
ensuring that no page is missed. By tightly
integrating the scan and the firewall, you can quickly block attacks on
web app vulnerabilities, prevent disclosure of sensitive information,
and control where and when your applications are accessed.
SECURE Seal
Enables online businesses of all sizes to scan their
websites for the presence of malware, network
and application vulnerabilities, as well as SSL
certificate validation. Once a website passes all
four security scans, the service generates a Qualys SECURE seal for
the merchant to display on their web site, demonstrating to visitors
that the company is committed to security.
VMVM
PCPC
QSQS
CMCM
PCIPCI
WASWAS
WAFWAF
Integrated Suite of Security & Compliance Solutions
New Security Services
Qualys plans to introduce new services in 2015 that will help organiza-
tions achieve continuous security including: Advanced Malware
Protection to detect and protect against advanced persistent threats,
and Log Management and Analytics for real time advanced analytics
and intelligence. Additionally, Qualys will expand its Policy Compliance
offering with a Customizable Questionnaire service to automate the
gathering of risk data.
Free Security Tools
BrowserCheck – https://browsercheck.qualys.com
SSL Secure Website Test – https://www.ssllabs.com/ssltest
FreeScan Vulnerability Scan – https://www.qualys.com/freescan
Top 4 Security Controls Audit – https://www.qualys.com/top4
Patch Tuesday PC Audit – https://www.qualys.com/patchtuesday
Qualys Cloud Platform & Integrated Suite
of Security & Compliance Solutions
ASSET
DISCOVERY
Find & organize hosts & web apps on a global scale
NETWORK
SECURITY
Identify & protect against proliferating security threats
WEB APP
SECURITY
Find, shield & fix vulnerabilities in your web apps
THREAT
PROTECTION
Harden your IT systems and web applications
COMPLIANCE
MONITORING
Make compliance faster, more efficient & more reliable