SlideShare une entreprise Scribd logo
1  sur  20
Continuous Security and Compliance Monitoring
for Global IT Assets
January 18, 2018
Chris Carlson
VP, Product Management
Qualys, Inc.
WannaCry: Observations of Qualys Threat Data
Inadequate Patching timing: high severity
vulnerabilities are taking 100+ days to
patch/configure/correct
Exploits and attacks patterns are speeding
up and taking
< 30 days on average (WannaCry was
distributed in 26 days)
2
WannaCry (MS17-010) and VM Scanning
Auth Scanning / Agent
EternalBlue released
New Auth Scanning / New
Agent Deployment
WannaCry Released
Organizations doing
continuous VM
assessment with
agent / authenticated
scanning
and
aggressively
patching
were much less
impacted by
WannaCry
3
The core IT service areas must be improved
Asset Identification, Monitoring all enterprise assets
Alert Speed, Triage Accuracy, Enabling effective response
Effective Vulnerability Remediation for real risks targeting
individual environments (emergency) vs. commodity risks
Asset & Configuration Management / Build Compliance
Network Architecture and Segmentation gaps – on-premise,
cloud and remote-users
Observations of Qualys Threat Data
4
How?
5
Transition from Point-in-Time Assessments
to
Continuous Security and Compliance Monitoring
6
Why? What factors are driving this?
• Rapidly reducing time from Vulnerability to Attack
• Attacks shifting to organized crime and ransomware
• Board-level / C-suite visibility and impact to security events
• Digital Transformation is creating an IT Transformation
Are you prepared?
7
Digital Transformation is Driving IT Transformation for
Organizations
Private Clouds
Enterprise On
Premise
Remote
End Users
Internet
Public Clouds
8
… But creates new Challenges for Security
Private Clouds
Enterprise On
Premise
Remote
End Users
Can’t scan remote users
Don’t know how many assets you have
Don’t know when those assets are running
Credential issues / Authentication failures
Monthly / weekly scanning too slow
9
End-to-end Security Architecture
Automated Continuous Monitoring & Response
Discovery
On-Prem
Cloud
Mobile Devices
OT/ICS
IoT
CMDB
Inventory
Prevention
Security Hygiene
Vulnerability
Assessment
Threat Prioritization
Patch Management
Configuration
Assessment
Detection
Endpoint Activity
Cloud Infra
Monitoring
Network Activity
Response
Security
Orchestration
Incident Response
Quarantine
NAC
10
Qualys Sensors
Scalable, self-updating & centrally managed
Physical
Legacy data
centers
Corporate
infrastructure
Continuous
security and
compliance
scanning
Virtual
Private cloud
infrastructure
Virtualized
Infrastructure
Continuous
security and
compliance
scanning
Cloud/Container
Commercial IaaS &
PaaS clouds
Pre-certified in market
place
Fully automated with
API orchestration
Continuous security
and compliance
scanning
Cloud Agents
Light weight, multi-
platform
On premise, elastic
cloud & endpoints
Real-time data
collection
Continuous evaluation
on platform for security
and compliance
Passive
Passively sniff on
network
Real-time device
discovery &
identification
Identification of APT
network traffic
Extract malware files
from network for
analysis
API
Integration with
Threat Intel feeds
CMDB Integration
Log connectors
11
Qualys Cloud Agent
Lightweight
Software Agent
(collects metadata only)
On-Premise
Servers,
Public Cloud,
Remote
Endpoints
Windows, Linux,
Mac,
AIX
Delivers Multiple
Security
Functions in one
Agent
12
Qualys Suite of
Applications
Central Management / API
Efficient Network Usage
(Delta Processing average)
Qualys
Platform
Cloud Agent
50 - 350 KB / day
Lightweight Metadata
Acquisition Resources
1% CPU (tunable)
3 MB applicationWindows, Linux, Mac, AIX
13
Cloud Agent Extends Network Scanning
No scan windows needed
Find vulnerabilities faster
Detect a fixed vulnerability faster
No firewall changes or network impact
Best for assets that can’t be scanned
Unable to get credentials / authentication failures
Remote / roaming user assets
Remote systems that can’t be scanned
Cloud / Elastic deployments
Servers sensitive to port scans
14
Try and Manage Apps on one Cloud Agent
End the fight with IT to deploy security agents!
DEMO
16
Selected Cloud Agent Deployments
Ecommerce Company
1,200,000 scope
(1M cloud + 150k users)
Financial Services 270,000 Windows (8K/wk)
Financial Services 25,000 user machines
Ecommerce 65,000 ~ 95,000 AWS
Oil Field Services 4,000 remote servers
Rx30 Pharmacy Management 4,500 servers/users/cloud
ACI Worldwide Payment Systems 1,500 servers/users
17
Global Pharmaceutical Company (Case Study)
Challenges • No vulnerability visibility of user endpoint machines
• Authenticated Scanning Failures on server machines
• Windows – 20% Failure rates
• Linux – 60% Failure rates
• Weekly scanning created gaps in reporting
• New IT initiative for AWS and Azure development difficult
to scan
• Deployed 75,000 Cloud Agents on user endpoints for
continuous visibility both on and off the network
• Deployed 20,000 Cloud Agents for on-premise servers to
overcome their authentication failures
• Cloud Agent finds new and fixed vulnerabilities faster than
scanning
• Building the Cloud Agent into gold cloud images
Solutions
Outcome
Customer
Global Pharmaceutical
Company
Industry
Pharmaceutical
Biopharmaceutical
Life Sciences
Qualys Applications
18
1+ trillion
Security Events
3+ billion
IP Scans/Audits a Year
99.9996%
Six Sigma Scanning Accuracy
250+ billion
Data Points Indexed on
Elasticsearch Clusters
Single Pane of Glass
Via dynamic and customizable dashboards and centrally
managed, self-updating, integrated Cloud Apps
19
Thank You
qualys.com/trial
ccarlson@qualys.com
20

Contenu connexe

Tendances

The parable of the talents
The parable of the talentsThe parable of the talents
The parable of the talents
Mary Sorial
 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testing
ecmee
 

Tendances (20)

The Calling of Elisha
The Calling of ElishaThe Calling of Elisha
The Calling of Elisha
 
Web application Security tools
Web application Security toolsWeb application Security tools
Web application Security tools
 
Threat modeling web application: a case study
Threat modeling web application: a case studyThreat modeling web application: a case study
Threat modeling web application: a case study
 
The making of a disciple ppt
The making of a disciple   pptThe making of a disciple   ppt
The making of a disciple ppt
 
Dealing with Negative Emotions in a Biblical Way
Dealing with Negative Emotions in a Biblical WayDealing with Negative Emotions in a Biblical Way
Dealing with Negative Emotions in a Biblical Way
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
2 Peter 1 Sermon
2  Peter 1 Sermon2  Peter 1 Sermon
2 Peter 1 Sermon
 
The Power of Your Praise
The Power of Your PraiseThe Power of Your Praise
The Power of Your Praise
 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
 
The parable of the talents
The parable of the talentsThe parable of the talents
The parable of the talents
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 
Periods of Bible History (Effective Bible Study)
Periods of Bible History (Effective Bible Study)Periods of Bible History (Effective Bible Study)
Periods of Bible History (Effective Bible Study)
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Revelation 5 The Seal Breaker (Lewis)
Revelation 5 The Seal Breaker (Lewis)Revelation 5 The Seal Breaker (Lewis)
Revelation 5 The Seal Breaker (Lewis)
 
how big is your god
how big is your godhow big is your god
how big is your god
 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testing
 
The third temple
The third templeThe third temple
The third temple
 
Saved Like Noah - [Baptism also now saves us … 1 Peter 3:18-22]
Saved Like Noah - [Baptism also now saves us … 1 Peter 3:18-22] Saved Like Noah - [Baptism also now saves us … 1 Peter 3:18-22]
Saved Like Noah - [Baptism also now saves us … 1 Peter 3:18-22]
 
Cyber Threat Management
Cyber Threat Management Cyber Threat Management
Cyber Threat Management
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 

Similaire à Webcast Series #1: Continuous Security and Compliance Monitoring for Global IT Assets

Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicro
dvmug1
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
Kashyap Kunal
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
karlhennesey
 

Similaire à Webcast Series #1: Continuous Security and Compliance Monitoring for Global IT Assets (20)

Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud Infrastructure
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicro
 
Elastic Security Brochure
Elastic Security BrochureElastic Security Brochure
Elastic Security Brochure
 
Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Implementing Private Clouds
Implementing Private CloudsImplementing Private Clouds
Implementing Private Clouds
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
 
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your NetworkRSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
 
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the Cloud
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 

Plus de Qualys

Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
Qualys
 
Gain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldGain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless World
Qualys
 

Plus de Qualys (8)

Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediation
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
 
Qualys Brochure for CISOs
Qualys Brochure for CISOsQualys Brochure for CISOs
Qualys Brochure for CISOs
 
How to Rapidly Identify Assets at Risk to WannaCry Ransomware
How to Rapidly Identify Assets at Risk to WannaCry RansomwareHow to Rapidly Identify Assets at Risk to WannaCry Ransomware
How to Rapidly Identify Assets at Risk to WannaCry Ransomware
 
Web App Attacks - Stats & Remediation
Web App Attacks - Stats & RemediationWeb App Attacks - Stats & Remediation
Web App Attacks - Stats & Remediation
 
Gain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldGain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless World
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Webcast Series #1: Continuous Security and Compliance Monitoring for Global IT Assets

  • 1. Continuous Security and Compliance Monitoring for Global IT Assets January 18, 2018 Chris Carlson VP, Product Management Qualys, Inc.
  • 2. WannaCry: Observations of Qualys Threat Data Inadequate Patching timing: high severity vulnerabilities are taking 100+ days to patch/configure/correct Exploits and attacks patterns are speeding up and taking < 30 days on average (WannaCry was distributed in 26 days) 2
  • 3. WannaCry (MS17-010) and VM Scanning Auth Scanning / Agent EternalBlue released New Auth Scanning / New Agent Deployment WannaCry Released Organizations doing continuous VM assessment with agent / authenticated scanning and aggressively patching were much less impacted by WannaCry 3
  • 4. The core IT service areas must be improved Asset Identification, Monitoring all enterprise assets Alert Speed, Triage Accuracy, Enabling effective response Effective Vulnerability Remediation for real risks targeting individual environments (emergency) vs. commodity risks Asset & Configuration Management / Build Compliance Network Architecture and Segmentation gaps – on-premise, cloud and remote-users Observations of Qualys Threat Data 4
  • 6. Transition from Point-in-Time Assessments to Continuous Security and Compliance Monitoring 6
  • 7. Why? What factors are driving this? • Rapidly reducing time from Vulnerability to Attack • Attacks shifting to organized crime and ransomware • Board-level / C-suite visibility and impact to security events • Digital Transformation is creating an IT Transformation Are you prepared? 7
  • 8. Digital Transformation is Driving IT Transformation for Organizations Private Clouds Enterprise On Premise Remote End Users Internet Public Clouds 8
  • 9. … But creates new Challenges for Security Private Clouds Enterprise On Premise Remote End Users Can’t scan remote users Don’t know how many assets you have Don’t know when those assets are running Credential issues / Authentication failures Monthly / weekly scanning too slow 9
  • 10. End-to-end Security Architecture Automated Continuous Monitoring & Response Discovery On-Prem Cloud Mobile Devices OT/ICS IoT CMDB Inventory Prevention Security Hygiene Vulnerability Assessment Threat Prioritization Patch Management Configuration Assessment Detection Endpoint Activity Cloud Infra Monitoring Network Activity Response Security Orchestration Incident Response Quarantine NAC 10
  • 11. Qualys Sensors Scalable, self-updating & centrally managed Physical Legacy data centers Corporate infrastructure Continuous security and compliance scanning Virtual Private cloud infrastructure Virtualized Infrastructure Continuous security and compliance scanning Cloud/Container Commercial IaaS & PaaS clouds Pre-certified in market place Fully automated with API orchestration Continuous security and compliance scanning Cloud Agents Light weight, multi- platform On premise, elastic cloud & endpoints Real-time data collection Continuous evaluation on platform for security and compliance Passive Passively sniff on network Real-time device discovery & identification Identification of APT network traffic Extract malware files from network for analysis API Integration with Threat Intel feeds CMDB Integration Log connectors 11
  • 12. Qualys Cloud Agent Lightweight Software Agent (collects metadata only) On-Premise Servers, Public Cloud, Remote Endpoints Windows, Linux, Mac, AIX Delivers Multiple Security Functions in one Agent 12
  • 13. Qualys Suite of Applications Central Management / API Efficient Network Usage (Delta Processing average) Qualys Platform Cloud Agent 50 - 350 KB / day Lightweight Metadata Acquisition Resources 1% CPU (tunable) 3 MB applicationWindows, Linux, Mac, AIX 13
  • 14. Cloud Agent Extends Network Scanning No scan windows needed Find vulnerabilities faster Detect a fixed vulnerability faster No firewall changes or network impact Best for assets that can’t be scanned Unable to get credentials / authentication failures Remote / roaming user assets Remote systems that can’t be scanned Cloud / Elastic deployments Servers sensitive to port scans 14
  • 15. Try and Manage Apps on one Cloud Agent End the fight with IT to deploy security agents!
  • 17. Selected Cloud Agent Deployments Ecommerce Company 1,200,000 scope (1M cloud + 150k users) Financial Services 270,000 Windows (8K/wk) Financial Services 25,000 user machines Ecommerce 65,000 ~ 95,000 AWS Oil Field Services 4,000 remote servers Rx30 Pharmacy Management 4,500 servers/users/cloud ACI Worldwide Payment Systems 1,500 servers/users 17
  • 18. Global Pharmaceutical Company (Case Study) Challenges • No vulnerability visibility of user endpoint machines • Authenticated Scanning Failures on server machines • Windows – 20% Failure rates • Linux – 60% Failure rates • Weekly scanning created gaps in reporting • New IT initiative for AWS and Azure development difficult to scan • Deployed 75,000 Cloud Agents on user endpoints for continuous visibility both on and off the network • Deployed 20,000 Cloud Agents for on-premise servers to overcome their authentication failures • Cloud Agent finds new and fixed vulnerabilities faster than scanning • Building the Cloud Agent into gold cloud images Solutions Outcome Customer Global Pharmaceutical Company Industry Pharmaceutical Biopharmaceutical Life Sciences Qualys Applications 18
  • 19. 1+ trillion Security Events 3+ billion IP Scans/Audits a Year 99.9996% Six Sigma Scanning Accuracy 250+ billion Data Points Indexed on Elasticsearch Clusters Single Pane of Glass Via dynamic and customizable dashboards and centrally managed, self-updating, integrated Cloud Apps 19