Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

2/11/2019
12:45 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Qualys Releases Global IT Asset Inventory Cloud App

The app is designed to deliver visibility and a source of truth for security and IT teams.

FOSTER CITY, Calif. – Feb. 11, 2019 – Qualys, Inc. (NASDAQ: QLYS), a pioneer and leading provider of cloud-based security and compliance solutions, today announced general availability of its groundbreaking global IT Asset Inventory (AI) Cloud App, which provides Security and IT teams a single source of truth to quickly analyze their complex and interconnected global IT environments, and collaborate on critical security remediation efforts.

Digital Transformation creates complex IT infrastructure that challenges organizations to accurately assess their networks and quickly remediate risk. Using a combination of Qualys sensors —Cloud Agents, scanners and passive network sensors— Qualys AI collects and analyzes data about assets across hybrid environments, and delivers up-to-date, comprehensive and continuous information about those assets and their security and compliance posture. Such capabilities allow Security and IT teams to quickly identify critical or potential risks, such as end-of-life software, and work together to remediate them.

Global IT Asset Inventory delivers unprecedented visibility and a single source of truth for Security and IT Teams.

For example, a Fortune 50 retailer now gains full visibility into their global corporate data centers, multi-cloud environment as well as stores and warehouses, providing them new insights into their complex global environment, and revealing hidden risk from unknown devices or end-of-life technology.

“Qualys Asset Inventory delivered immediate value by providing insights and exponentially accelerating time-to-decision,” said Sunil Saale, Head of Cyber and Information Security, MinterEllison. “It gives us the ability to see every asset on our network, and gives us high-fidelity, granular IT asset data that can be used across IT and security initiatives, such as monitoring for any unapproved software and tracking end-of-life hardware and software that impact our technology roadmaps.”

“You simply cannot secure what you do not know, and our new groundbreaking global IT Asset Inventory cloud app provides a single source of truth across on-premises infrastructure, endpoints, and clouds,” said Philippe Courtot, chairman and CEO, Qualys, Inc. “Since it is fully integrated with the Qualys Cloud Platform, you will know instantly what assets connect to your network, and be able to assess their security and compliance posture in real-time, giving you unprecedented and essential visibility.”

Continuous Risk Assessment and Compliance Management
With increasing risks, regulations on security and privacy, and software licensing audits, the role of IT asset management is neither optional nor the concern of IT teams alone. Industry regulations and standards such as PCI DSS, HIPAA, GDPR and FedRAMP require organizations to continuously identify, track and secure assets storing sensitive data.

Qualys AI frees security and compliance teams from dependence on legacy inventory tools and helps these teams manage the risk profile of their assets in real-time by:

  • helping ensure no unauthorized assets are spun-up in production.
  • detecting when applications outside their whitelist are running.
  • alerting teams when vulnerable, end-of-life or unlicensed software is present.

A Single Source of Truth to Eliminate Blind Spots
Qualys AI continuously gathers asset telemetry to identify and categorize devices, hardware, and software. Both IT and Security teams can then drill down into the resulting asset details and risk information to make informed business decisions.

Qualys AI also eliminates the need to manually integrate disparate systems or dispute the validity of data sets, allowing teams to share a common source of truth, leading to better IT and security outcomes. Customers can update their CMDB with detailed asset data to enable initiatives such as:

  • IT cost reduction
  • enterprise architecture
  • cloud and data center migrations
  • service management

The certified Qualys CMDB Sync App for ServiceNow supports 2-way synchronization of asset information.

Pricing and Availability
Qualys AI is generally available today starting at $15 per asset per year.

Additional Resources:
● Read more about Qualys IT Asset Inventory
● Read more about Qualys Cloud Platform
● Follow Qualys on LinkedIn and Twitter

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5230
PUBLISHED: 2019-11-13
P20 Pro, P20, Mate RS smartphones with versions earlier than Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than Emily-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8) have an improper validation vulnerability. The system does not perform...
CVE-2019-5231
PUBLISHED: 2019-11-13
P30 smartphones with versions earlier than ELLE-AL00B 9.1.0.186(C00E180R2P1) have an improper authorization vulnerability. The software incorrectly performs an authorization check when a user attempts to perform certain action. Successful exploit could allow the attacker to update a crafted package.
CVE-2019-5233
PUBLISHED: 2019-11-13
Huawei smartphones with versions earlier than Taurus-AL00B 10.0.0.41(SP2C00E41R3P2) have an improper authentication vulnerability. Successful exploitation may cause the attacker to access specific components.
CVE-2019-5246
PUBLISHED: 2019-11-13
Smartphones with software of ELLE-AL00B 9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1) have an insufficient verification vulnerability. The system does not verify certain par...
CVE-2010-4177
PUBLISHED: 2019-11-12
mysql-gui-tools (mysql-query-browser and mysql-admin) before 5.0r14+openSUSE-2.3 exposes the password of a user connected to the MySQL server in clear text form via the list of running processes.