Qualys’ unique approach to EASM is integrating the internal and external asset data from CyberSecurity Attack Management with its VMDR solution into a single view.Michelle Abraham Research Director, Security and Trust at IDC
Qualys CSAM provides invaluable attack surface insights from an external attacker's point of view. The automated workflows enable us to prioritize security engineering actions that will reduce cyber risk and rapidly improve our company's security.Mike Orosz Vice President of Information and Product Security at Vertiv
Asset management in the security operations context isn’t just ‘seeing’ an asset; it is having the right ‘risk’ context of each and every software, hardware and IoT asset at our fingertips.Jatinder Pal Singh Director of Security Operations at Informatica
With Qualys, organizations can better identify undiscovered assets and immediately access and mitigate the cyber risk within the same workflow.Michelle Abraham Research Director, Security and Trust at IDC
Qualys CyberSecurity Asset Management allows us to proactively augment our vulnerability management program by discovering risks presented by previously unknown internet-facing devices.Mike Orosz Vice President of Information and Product Security at Vertiv
The attack surface is expanding at an exponential rate, providing attackers with new targets. More than 30% of all on-premises and cloud assets and services are not inventoried. It’s a huge visibility gap for cybersecurity!
CyberSecurity Asset Management (CSAM) is a cloud service that allows customers to continuously discover, classify, remediate, and measurably improve their cybersecurity posture for internal and external IT assets before the attackers can – and with the same actionable intelligence that the attackers use. It discovers all known and previously unknown internet-facing assets for 100% visibility and tracking of risks.
Qualys CSAM 2.0 includes External Attack Surface Management which adds “defense-in-depth” to update an organization’s cybersecurity posture. It provides the ability to continuously discover and classify previously unknown assets with a Red Team-style asset and vulnerability management solution for full 360-degree coverage.
Asset Management Built for Security and Integrated with IT
External Attack Surface Management (NEW) (2 mins)
What isn’t known can’t be secured. CSAM 2.0 with External Attack Surface Management collects data from on-premises devices and applications, all endpoints, cloud, containers, OT, and IoT. It continuously discovers IT assets for 100% real-time visibility of a global hybrid IT environment. The service works in conjunction with the Qualys Cloud Platform and Qualys sensors (scanners, cloud connectors, container sensors, cloud agents, passive sensors and APIs) to continuously discover all assets.
Gain actionable intelligence, visibility, and insight into the entire internal and external attack surface
Discovers domains, subdomains, and certificates within the enterprise and in subsidiaries and business partners for full visibility of remotely exploitable vulnerabilities – including previously unknown devices via attribution
Expose “shadow IT” and baseline discrepancies including VMs, containers, functions-as-a-service, and IoT that spin up faster than IT can track with legacy tools
Get an outside-in view of internet-facing assets to spot security endpoint blind spots
Reduce tech debt with CISA-compliant end-of-life and end-of-support software tacking, and Ling software versioning to track OS status and related vulnerabilities
Using a disciplined approach to managing cybersecurity risk will help an organization produce better, faster results for securing the enterprise. CSAM 2.0 with External Attack Surface Management is fully integrated with VMDR 2.0 with Qualys TruRisk. This enables a rigorous cyber risk management process based on automatic correlation of discovered assets, associated vulnerabilities found, and their degree of direct impact on the customer’s unique business. Continuous analysis enables viewing potential attacks from the attacker’s perspective: finding the easiest path to compromise business processes or steal the most valuable data. As a result, Cybersecurity teams know exactly which vulnerabilities to address first based on actual risk, and which can be de-prioritized or ignored due to low or no impact on the business.
Tag assets for easy grouping
Enable risk management
Execute like an attacker
Enable business impact analysis (BIA)
Orchestration provides automatic response to true business threats. CSAM 2.0 in conjunction with VMDR 2.0 with Qualys TruRisk controls orchestration by thresholds and other criteria set by a team to enable faster MTTR. An orchestration process could be deployment of the most relevant, correct and superseding patch for auto-remediation. Another is automatic quarantine of suspicious devices until team investigation. The service automatically documents compliance with regulations and policies, including full SOC 2 Type II. As part of the Qualys Cloud Platform, CyberSecurity Asset Management is fully integrated with all Qualys services.
Alert, report, and respond to identified security risks
Auto-document compliance for PCI DSS, FedRAMP, NIST, ISO, and other policies
Leverage the integrated Qualys Cloud Platform, to extend beyond External Attack Surface Management
Continuous bi-directional synchronization with the ServiceNow CMDB enables automatic enrichment with business and organizational data. This feature populates a ServiceNow CMDB with 360-degree asset data from Qualys and infuses Qualys with relevant CMDB attribute data for business impact analysis (BIA). The result: creation of accurate asset risk profiles and criticality measures to help a team focus on remediating the risk present in the most critical assets first.
Continuously sync with ServiceNow
Add context for security-centric asset visibility
Add security and business context to asset inventory