Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

7/24/2012
01:20 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Qualys Announces General Availability Of Its Dynamic Asset Tagging And Management Technology

Technology enables customers to identify, categorize, and manage large numbers of assets in highly dynamic IT environments

REDWOOD CITY, Calif., July 24, 2012 – Qualys®, Inc., a pioneer and leading provider of cloud security and compliance solutions, today announced the general availability of Dynamic Asset Tagging and Management technology for its QualysGuard Cloud Platform and integrated suite of solutions for security and compliance, the QualysGuard Cloud Suite. The patent-pending technology enables customers to identify, categorize and manage large numbers of assets in highly dynamic IT environments, and automates the process of inventory management and hierarchical organization of IT assets.

Qualys will showcase these new capabilities this week at Black Hat USA 2012 Briefings – booth #401 on July 25-26.

“Keeping an accurate and up-to-date inventory of IT assets is a critical step in maintaining secure environments,” said Anton Chuvakin, research director for Gartner. “Asset tagging that works for ever-changing lists of assets allows organizations to manage their IT assets on an on going basis, establish a trusted repository for IT system configurations, and maintain hierarchical relationships between them in order to more effectively secure their environments.”

QualysGuard dynamic asset tagging automates the process of inventory management and is seamlessly integrated with workflows throughout the QualysGuard Cloud Suite. Easy-to-use, rules-based dynamic tags enable automatic hierarchical organization of IT systems, web applications, scanner appliances and a wide range of other data within the cloud solutions for IT security and compliance. Key benefits of this technology are:

● Ability to Leverage Scan Results to Organize Assets. The rules-based dynamic asset tagging engine uses information from scan results to assign or remove tags, allowing scans to automatically and regularly keep your assets organized, significantly reducing manual labor.

● Fast, Scalable Tag Assignment. QualysGuard dynamic asset tagging provides rapid tag assignment even when processing hundreds of scans on millions of assets.

● Flexible Organization of Assets. Users can manually assign tags by dragging and dropping, or create dynamic tags based on rules. Dynamic tagging rules can be as simple as an OS pattern match, and as powerful as a customer-configurable script that evaluates complex business logic.

● Hierarchical Organization. Assets can be grouped for different needs, such as geography, line of business, or technology type, and into trees showing relationships between assets and various business units. Assets can have multiple tags assigned or belong to multiple hierarchies, creating a very flexible, robust and accurate organization.

● Powerful Access Management. Tags are used to apply role-based security to assets so customers can assign access privileges to users based on one or more tags, creating a powerful way to secure the use of the QualysGuard Cloud Suite in large enterprises.

● Focused Reporting and Scanning. Users can choose to run scans and reports against one or more tags, creating an easy way to quickly zero in on specific areas and assets in a customer’s business.

“With our dynamic asset tagging technology, customers can obtain a clean inventory of IT devices and web applications on a regular basis, which are essential to understanding what assets and configurations are deployed in their environments,” said Philippe Courtot, chairman and CEO for Qualys. “Available with our QualysGuard Cloud Suite, this functionality can be accessed by customers without installing any discovery and inventory software agents on devices, which can be expensive and time consuming.”

Future functionalities of the QualysGuard Dynamic Asset Tagging and Management technology will include connectors that provide integration and synchronization capabilities to inventory sources such as Active Directory and virtualization environments with visualization of assets’ relationships.

Availability

QualysGuard Dynamic Asset Tagging is now generally available as part of the QualysGuard Cloud Suite of IT security and compliance solutions.

About QualysGuard Cloud Platform

The QualysGuard Cloud Platform and its integrated suite of security and compliance solutions provide organizations of all sizes with a global view of their security and compliance posture, while reducing their total cost of ownership. The QualysGuard Cloud Suite, which includes Vulnerability Management, Web Application Scanning, Malware Detection Service, Policy Compliance, PCI Compliance and Qualys SECURE Seal, enable customers to identify their IT assets, collect and analyze large amounts of IT security data, discover and prioritize vulnerabilities and malware, recommend remediation actions and verify the implementation of such actions.

About QualysGuard Cloud Suite

The QualysGuard Cloud Suite currently includes six solutions: Vulnerability Management, Web Application Scanning, Malware Detection Service, Policy Compliance, PCI Compliance and SECURE Seal. This integrated set of cloud solutions enables organizations to automate the lifecycle of asset discovery, security assessments, and compliance management for IT systems and web applications, whether they reside inside the organization, on their network perimeter or in the cloud. The QualysGuard Cloud Suite has been designed since inception to be delivered through the cloud and to be easily and rapidly deployed on a global scale, enabling faster implementation, broader adoption and lower total cost of ownership than traditional enterprise products.

About Qualys

Qualys, Inc., is a pioneer and leading provider of cloud security and compliance solutions with over 5,700 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The QualysGuard Cloud Platform and integrated suite of solutions helps organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including BT, Dell SecureWorks, Fujitsu, IBM, NTT, Symantec, Verizon, and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA).

For more information, please visit www.qualys.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-20620
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2021-20621
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
CVE-2021-20622
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2020-5626
PUBLISHED: 2021-01-28
Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier allow remote attackers to execute arbitrary OS commands via a specially crafted log file.
CVE-2021-3142
PUBLISHED: 2021-01-28
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-35128. Reason: This candidate is a reservation duplicate of CVE-2020-35128. Notes: All CVE users should reference CVE-2020-35128 instead of this candidate. All references and descriptions in this candidate have been removed to preve...