A risk-based approach to cybersecurity is built on a foundation of attack surface management (ASM). With CyberSecurity Asset Management (CSAM), Security and IT Ops gain both an attackers and defenders view of their environment for complete, 360-degree visibility of assets, asset groups, domains, subdomains, End-of-Life (EOL) tracking, and more. Together, with External Attack Surface Management (EASM), CSAM helps organizations discover, enrich, detect, prioritize, and orchestrate workflows between Security and IT Teams to eliminate workflow friction, improve remediation, and slash cyber risk.
Attackers target external assets and software that are not visible to security practitioners that rely on conventional attack surface management and vulnerability management solutions alone. To reduce cyber risk and bridge the IT security gap, the modern enterprise must be able to achieve complete visibility of both internal and external internet-facing assets.
Qualys CSAM with EASM gives IT and Security Teams a means of achieving complete visibility of both internal and external internet-facing assets in a way that is natively integrated with Qualys Web Application (WAS) and the World’s leading vulnerability management solution – VMDR.
Rely on CSAM to visualize your entire attack surface, automate remediation workflows, and reduce cyber risk.
The attack surface is expanding at an exponential rate, providing attackers with new targets. More than 30% of all on-premises and cloud assets and services are not inventoried. It’s a huge visibility gap for cybersecurity!
CSAM is a cloud service that allows customers to continuously discover, classify, remediate, and measurably improve their cybersecurity posture for internal and external IT assets before the attackers can – and with the same actionable intelligence that the attackers use. It discovers all known and previously unknown internet-facing assets for 100% visibility and tracking of risks.
Qualys CSAM includes External Attack Surface Management which adds “defense-in-depth” to update an organization’s cybersecurity posture. It provides the ability to continuously discover and classify previously unknown assets with a Red Team-style asset and vulnerability management solution for full 360-degree coverage.
Asset Management Built for Security and Integrated with IT
Continuous discovery of all assets and software instances in the cloud, on-premises, IT and IoT environments. CyberSecurity Asset Management uses advanced credentialed and non-credential scanning technologies to continuously and quickly discover and classify vulnerabilities for remediation. It automatically finds known and previously unknown assets ranging from instances and containers to repositories and devices along with domains and subdomains, connected subsidiaries and business partners for full visibility of potential risk vectors.
Learn moreAutomatically keep your CMDB up-to-date with credible and comprehensive asset metadata, complemented with data correlation and reconciliation CyberSecurity Asset Management uses advanced credentialed and non-credential scanning to continuously and quickly discover, classify and prioritize vulnerabilities for remediation that simultaneously increases risk insight and decreases MTTR but up to 50% from other asset management and vulnerability management stacks.
Learn moreContinuous discovery of all assets and software instances in the cloud, on-premises, IT, OT and IoT environments with TruRisk scoring. Automatically find known and previously unknown assets ranging from instances and containers to repositories and devices along with domains and subdomains, connected subsidiaries, and business partners for complete visibility of potential risk vectors that are informed by the Qualys TruRisk scoring methodology.
Learn moreUncover gaps in policy compliance, policies, configurations, and security hygiene with asset criticality scoring. CyberSecurity Assign asset criticality score to a tag and the corresponding asset with organizational in-context enrichment data. This context enables analysis of threats and misconfigurations in real time, with six-sigma accuracy. The service continuously detects remotely exploitable vulnerabilities and critical misconfigurations across the global hybrid environment such as EOL/EOS and unauthorized or missing titles to compliment technology roadmap planning and policy compliance.
Learn moreLeverage transparent TruRisk methodology to assign asset criticality score to a tag and the corresponding asset with organizational in-context enrichment data. CyberSecurity With the context provided by Qualys TruRisk, CyberSecurity Asset Management simultaneously improves vulnerability analysis and decreases MTTR by up to 50% from other asset management and vulnerability management stacks.
Learn moreBidirectional workflows between ITSM tools, such as Jira and ServiceNow, allow Security and IT Teams act quickly on remediation actions and track risk reduction over time. CyberSecurity Threat insights are worthless without an IT team’s ability to implement remediation actions against them quickly. With CyberSecurity Asset Management, leverage the seamless integration between the Qualys Platform and ITSM tools to track, trace, and patch with no-code workflows.
Learn moreExternal Attack Surface Management (NEW) (2 mins)
External Attack Surface Management (NEW) (2 mins)
CSAM Highlights (2 mins)
Features Overview (5 mins)
What isn’t known can’t be secured. Qualys CSAM with External Attack Surface Management collects data from on-premises devices and applications, all endpoints, cloud, containers, OT, and IoT. It continuously discovers IT assets for 100% real-time visibility of a global hybrid IT environment. The service works in conjunction with the Qualys Cloud Platform and Qualys sensors (scanners, cloud connectors, container sensors, cloud agents, passive sensors and APIs) to continuously discover all assets.
Gain actionable intelligence, visibility, and insight into the entire internal and external attack surface
Discovers domains, subdomains, and certificates within the enterprise and in subsidiaries and business partners for full visibility of remotely exploitable vulnerabilities – including previously unknown devices via attribution
Expose “shadow IT” and baseline discrepancies including VMs, containers, functions-as-a-service, and IoT that spin up faster than IT can track with legacy tools
Get an outside-in view of internet-facing assets to spot security endpoint blind spots
Reduce tech debt with CISA-compliant end-of-life and end-of-support software tacking, and Ling software versioning to track OS status and related vulnerabilities
Learn more
Using a disciplined approach to managing cybersecurity risk will help an organization produce better, faster results for securing the enterprise. Qualys CSAM with External Attack Surface Management is fully integrated with Qualys VMDR with Qualys TruRisk. This enables a rigorous cyber risk management process based on automatic correlation of discovered assets, associated vulnerabilities found, and their degree of direct impact on the customer’s unique business. Continuous analysis enables viewing potential attacks from the attacker’s perspective: finding the easiest path to compromise business processes or steal the most valuable data. As a result, CyberSecurity teams know exactly which vulnerabilities to address first based on actual risk, and which can be de-prioritized or ignored due to low or no impact on the business.
Tag assets for easy grouping
Enable risk management
Execute like an attacker
Enable business impact analysis (BIA)
Learn more
Orchestration provides automatic response to true business threats. Qualys CSAM in conjunction with Qualys VMDR with Qualys TruRisk controls orchestration by thresholds and other criteria set by a team to enable faster MTTR. An orchestration process could be deployment of the most relevant, correct and superseding patch for auto-remediation. Another is automatic quarantine of suspicious devices until team investigation. The service automatically documents compliance with regulations and policies, including full SOC 2 Type II. As part of the Qualys Cloud Platform, CyberSecurity Asset Management is fully integrated with all Qualys services.
Alert, report, and respond to identified security risks
Auto-document compliance for PCI DSS, FedRAMP, NIST, ISO, and other policies
Leverage the integrated Qualys Cloud Platform, to extend beyond External Attack Surface Management
Continuous bi-directional synchronization with the ServiceNow CMDB enables automatic enrichment with business and organizational data. This feature populates a ServiceNow CMDB with 360-degree asset data from Qualys and infuses Qualys with relevant CMDB attribute data for business impact analysis (BIA). The result: creation of accurate asset risk profiles and criticality measures to help a team focus on remediating the risk present in the most critical assets first.
Learn more
Continuously sync with ServiceNow
Add context for security-centric asset visibility
Add security and business context to asset inventory
Start your free trial today.
No software to download or install.
Email us to request a quote or call us at
1 (800) 745-4355.