Organizations Can Now Proactively Monitor Both Perimeter and Internal IT Assets to Get Real Time Alerts and Accelerate Incident Response
SAN FRANCISCO, Calif. – RSA Conference USA 2015, Booth #N3421 – April 21, 2015 – Qualys, Inc. (NASDAQ: QLYS), a pioneer and leading provider of cloud security and compliance solutions, today announced its popular Qualys Continuous Monitoring (CM) solution for the perimeter now includes internal monitoring capabilities enabling organizations to proactively monitor and get real-time alerts for critical internal IT assets such as desktops, servers and other devices. This expansion enables customers to have the most comprehensive and up-to-date view of their entire organization to proactively identify potential threats, while accelerating incident response time.
Today’s cyber attacks are often a result of cyber criminals scanning and attacking networks on a continuous basis, coupled with an event-driven approach to monitoring an organization’s perimeter. As a result, vulnerable machines can be exploited within hours with toxic combinations of scenarios that can lead to compromises in their IT environments such as zero-days and phishing scams, which can instantly expose an organization’s data. Qualys Continuous Monitoring provides a real-time view of an entire organization, and immediately notifies the IT staff as changes are detected so they can take appropriate action.
Qualys Continuous Monitoring allows organizations to continuously monitor and respond to changes in their internal environment such as new hosts, OS changes, open ports and services, SSL certificates, as well as changes in vulnerabilities and software.
“Network perimeters are rapidly evolving and expanding. Enterprise data no longer lives solely in the data center but is shared across remote locations and devices, making networks susceptible to cyber attacks,” said Philippe Courtot, Chairman and CEO for Qualys, Inc. “Our Continuous Monitoring solution helps customers proactively monitor, identify and alert them to unexpected changes in all their critical IT assets before they turn into breaches.”
Built on the world’s leading cloud security and compliance platform, Qualys CM requires no special hardware and can be set up with a few simple clicks. A user simply needs to identify the host or hosts that need to be monitored, who to alert when states change, and what that change might be. The solution complements the speed of deployment, unparalleled scalability, and accuracy of Qualys Vulnerability Management and other services in the Qualys Cloud Platform.
Analyst Perspective
Neil MacDonald, VP Distinguished Analyst, Gartner
Peter Firstbrook, Research VP, Gartner
“All organizations should now assume that they are in a state of continuous compromise. However, organizations have deluded themselves into believing that 100% prevention is possible, and they have become overly reliant on blocking-based and signature-based mechanisms for protection.” Gartner recommends you, “Develop a security operations center that supports continuous monitoring and is responsible for the continuous threat protection process.”*
Availability
Qualys Continuous Monitoring for internal scanning is now available and sold via annual subscription, based on the number of IPs. To learn more about Continuous Monitoring or see a demo, visit https://www.qualys.com/CM.
Additional Resources
*Gartner, Designing an Adaptive Security Architecture for Protection From Advanced Attacks, Neil MacDonald, Peter Firstbrook, 12 February 2014
About Qualys, Inc.
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud security and compliance solutions with over 7,700 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, Accuvant, BT, Cognizant Technology Solutions, Dell SecureWorks, Fujitsu, HCL Comnet, InfoSys, NTT, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA) and Council on CyberSecurity. For more information, please visit www.qualys.com.
Qualys, the Qualys logo and QualysGuard are proprietary trademarks of Qualys, Inc. All other products or names may be trademarks of their respective companies.
MEDIA CONTACTS
Melissa Liton
Qualys, Inc.
mliton@qualys.com
(650) 801-6242
Rebecca Houghman
OneBite PR
rebecca.hougham@onebite.co.uk
+44 (0)1635 887 697
###
Media Contact:
Tami Casey
Qualys
media@qualys.com