Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

2/11/2019
12:45 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Qualys Releases Global IT Asset Inventory Cloud App

The app is designed to deliver visibility and a source of truth for security and IT teams.

FOSTER CITY, Calif. – Feb. 11, 2019 – Qualys, Inc. (NASDAQ: QLYS), a pioneer and leading provider of cloud-based security and compliance solutions, today announced general availability of its groundbreaking global IT Asset Inventory (AI) Cloud App, which provides Security and IT teams a single source of truth to quickly analyze their complex and interconnected global IT environments, and collaborate on critical security remediation efforts.

Digital Transformation creates complex IT infrastructure that challenges organizations to accurately assess their networks and quickly remediate risk. Using a combination of Qualys sensors —Cloud Agents, scanners and passive network sensors— Qualys AI collects and analyzes data about assets across hybrid environments, and delivers up-to-date, comprehensive and continuous information about those assets and their security and compliance posture. Such capabilities allow Security and IT teams to quickly identify critical or potential risks, such as end-of-life software, and work together to remediate them.

Global IT Asset Inventory delivers unprecedented visibility and a single source of truth for Security and IT Teams.

For example, a Fortune 50 retailer now gains full visibility into their global corporate data centers, multi-cloud environment as well as stores and warehouses, providing them new insights into their complex global environment, and revealing hidden risk from unknown devices or end-of-life technology.

“Qualys Asset Inventory delivered immediate value by providing insights and exponentially accelerating time-to-decision,” said Sunil Saale, Head of Cyber and Information Security, MinterEllison. “It gives us the ability to see every asset on our network, and gives us high-fidelity, granular IT asset data that can be used across IT and security initiatives, such as monitoring for any unapproved software and tracking end-of-life hardware and software that impact our technology roadmaps.”

“You simply cannot secure what you do not know, and our new groundbreaking global IT Asset Inventory cloud app provides a single source of truth across on-premises infrastructure, endpoints, and clouds,” said Philippe Courtot, chairman and CEO, Qualys, Inc. “Since it is fully integrated with the Qualys Cloud Platform, you will know instantly what assets connect to your network, and be able to assess their security and compliance posture in real-time, giving you unprecedented and essential visibility.”

Continuous Risk Assessment and Compliance Management
With increasing risks, regulations on security and privacy, and software licensing audits, the role of IT asset management is neither optional nor the concern of IT teams alone. Industry regulations and standards such as PCI DSS, HIPAA, GDPR and FedRAMP require organizations to continuously identify, track and secure assets storing sensitive data.

Qualys AI frees security and compliance teams from dependence on legacy inventory tools and helps these teams manage the risk profile of their assets in real-time by:

  • helping ensure no unauthorized assets are spun-up in production.
  • detecting when applications outside their whitelist are running.
  • alerting teams when vulnerable, end-of-life or unlicensed software is present.

A Single Source of Truth to Eliminate Blind Spots
Qualys AI continuously gathers asset telemetry to identify and categorize devices, hardware, and software. Both IT and Security teams can then drill down into the resulting asset details and risk information to make informed business decisions.

Qualys AI also eliminates the need to manually integrate disparate systems or dispute the validity of data sets, allowing teams to share a common source of truth, leading to better IT and security outcomes. Customers can update their CMDB with detailed asset data to enable initiatives such as:

  • IT cost reduction
  • enterprise architecture
  • cloud and data center migrations
  • service management

The certified Qualys CMDB Sync App for ServiceNow supports 2-way synchronization of asset information.

Pricing and Availability
Qualys AI is generally available today starting at $15 per asset per year.

Additional Resources:
● Read more about Qualys IT Asset Inventory
● Read more about Qualys Cloud Platform
● Follow Qualys on LinkedIn and Twitter

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Aviation Faces Increasing Cybersecurity Scrutiny
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/22/2019
Microsoft Tops Phishers' Favorite Brands as Facebook Spikes
Kelly Sheridan, Staff Editor, Dark Reading,  8/22/2019
Capital One Breach: What Security Teams Can Do Now
Dr. Richard Gold, Head of Security Engineering at Digital Shadows,  8/23/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2016-6154
PUBLISHED: 2019-08-23
The authentication applet in Watchguard Fireware 11.11 Operating System has reflected XSS (this can also cause an open redirect).
CVE-2019-5594
PUBLISHED: 2019-08-23
An Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") in Fortinet FortiNAC 8.3.0 to 8.3.6 and 8.5.0 admin webUI may allow an unauthenticated attacker to perform a reflected XSS attack via the search field in the webUI.
CVE-2019-6695
PUBLISHED: 2019-08-23
Lack of root file system integrity checking in Fortinet FortiManager VM application images of all versions below 6.2.1 may allow an attacker to implant third-party programs by recreating the image through specific methods.
CVE-2019-12400
PUBLISHED: 2019-08-23
In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this im...
CVE-2019-15092
PUBLISHED: 2019-08-23
The webtoffee "WordPress Users & WooCommerce Customers Import Export" plugin 1.3.0 for WordPress allows CSV injection in the user_url, display_name, first_name, and last_name columns in an exported CSV file created by the WF_CustomerImpExpCsv_Exporter class.