Highlights

Agent-based detection

In addition to our scanners, VM also works with the groundbreaking Qualys Cloud Agents, extending its network coverage to assets that can’t be scanned. The lightweight, all-purpose, self-updating agents reside on the assets they monitor— no scan windows, credentials, or firewall changes needed.

Constant monitoring and alerts

When VM is paired with Continuous Monitoring (CM), InfoSec teams are proactively alerted about potential threats so problems can be tackled before turning into breaches. You can tailor alerts and be notified about general changes or specific circumstances. CM gives you a hacker’s-eye view of your perimeter, acting as your cloud sentinel.

Comprehensive coverage and visibility

Qualys VM continuously scans and identifies vulnerabilities with Six Sigma (99.99966%) accuracy, protecting your IT assets on premises, in the cloud and mobile endpoints. Its executive dashboard displays an overview of your security posture and access to remediation details.

Discover forgotten devices and organize your host assets

With Qualys, you can quickly determine what’s actually running in the different parts of your network—from your perimeter and corporate network to virtualized machines and cloud services such as Amazon EC2. Uncover unexpected access points, web servers and other devices that can leave your network open to attack.

  • Visually map your network with our graphical host map.

  • Prioritize your remediation by assigning a business impact to each asset.

  • Identify which OS, ports, services and certificates are on each device on your network

  • Organize hosts to match the structure of your business—e.g., by location, region, and company department

  • Control which hosts can be scanned by which users

  • Continuously monitor your perimeter for unexpected changes with our optional Continuous Monitoring service

Powered by the Qualys Cloud Platform

Single-pane-of-glass UI

See the results in one place, in seconds. With AssetView, security and compliance pros and managers get a complete and continuously updated view of all of their IT assets — from a single dashboard interface. Its fully customizable and lets you see the big picture, drill down into details, and generate reports for teammates and auditors.

Centralized & customized

Centralize discovery of host assets for multiple types of assessments. Organize host asset groups to match the structure of your business. Keep security data private with our end-to-end encryption & strong access controls. You can centrally manage users’ access to their Qualys accounts through your enterprise single sign-on (SSO).

Easy deployment

Deploy from a public or private cloud — fully managed by Qualys. With Qualys, there are no servers to provision, no software to install, and no databases to maintain. You always have the latest Qualys features available through your browser, without setting up special client software or VPN connections.

Custom reports anytime, anywhere — without rescanning

Qualys’ ability to track vulnerability data across hosts and time lets you use reports interactively to better understand the security of your network. Use a library of built-in reports, change what’s shown or choose different sets of assets — all without having to rescan. Reports can be generated on demand or scheduled automatically and then shared with the appropriate recipients online, in PDF or CSV.

  • Create different reports for different audiences—from scorecards for executives, to detailed drill-downs for IT teams

  • Document that policies are followed & lapses get fixed.

  • Identify which OS, ports, services and certificates are on each device on your network

  • Provide context & insight about each vulnerability, including trends, predictions, and potential solutions.

  • Track ongoing progress against vulnerability management objectives.

  • Share up-to-the-minute data with GRC systems & other enterprise applications via XML-based APIs.

Contact