• Platform
  • Solutions
  • Customers
  • Resources
  • Support
  • More

Overview

  • Enterprise TruRisk Platform

    Everything you need to measure, manage, and reduce your cyber risk in one place

Capabilities

All
Asset Management
Vulnerability & Configuration Management
Risk Remediation
Threat Detection & Response
Compliance
Cloud Security

Platform Apps

Asset Management
CyberSecurity Asset Management (CSAM)

See entire attack surface, continuously maintain your CMDB, and track EOL/EOS software

External Attack Surface Management (EASM)

Gain an attacker’s view of your external internet-facing assets and unauthorized software

Vulnerability & Configuration Management
TotalAppSec NEW

Get AI-powered, unified application risk management with web app & API security testing and malware detection all-in-one

Enterprise TruRisk Management (ETM) NEW

Consolidate & translate security & vulnerability findings from 3rd party tools

API Security

Scan REST/SOAP APIs & check API compliance with shift-left API testing

TotalAI NEW

Holistic AI security with vulnerability assessment and protection

Web App Scanning (WAS)

Automate scanning in CI/CD environments with shift left DAST testing

Vulnerability Management, Detection & Response (VMDR)

Discover, assess, prioritize, and patch critical vulnerabilities up to 50% faster

Web Malware Detection

Identify known and zero-day attacks using deep learning-based web malware detection

Risk Remediation
TruRisk Eliminate (TE) NEW

Address critical vulnerabilities with flexible, patchless solutions

Patch Management (PM)

Efficiently remediate vulnerabilities and patch systems

Custom Assessment and Remediation (CAR)

Quickly create custom scripts and controls for faster, more automated remediation

Threat Detection & Response
Multi-Vector EDR

Advanced endpoint threat protection, improved threat context, and alert prioritization

Compliance
Policy Audit NEW

Reduce risk, and comply with internal policies and external regulations with ease

File Integrity Monitoring (FIM)

Reduce alert noise and safeguard files from nefarious actors and cyber threats

Cloud Security
TotalCloud (CNAPP)

Cloud-Native Application Protection Platform (CNAPP) for multi-cloud environment.

Cloud Security Posture Management (CSPM)

Continuously discover, monitor, and analyze your cloud assets for misconfigurations and non-standard deployments.

Kubernetes and Container Security (KCS)

Discover, track, and continuously secure containers – from build to runtime

Cloud Workload Protection (CWP)

Detect, prioritize, and remediate vulnerabilities in your cloud environment

Infrastructure as Code Security (IaC)

Detect and remediate security issues within IaC templates

Cloud Infrastructure and Entitlement Management (CIEM)

Solution to automate the process of managing user entitlements and privileges in cloud environments

Cloud Detection and Response (CDR)

Continuous real-time protection of the multi-cloud environment against active exploitation, malware, and unknown threats.

Cloud Workflow Automation (CWA)

Qualys Flow is a Low-code/No-code, remediation and workflow automation tool

SaaS Security Posture Management (SSPM)

Automate the process of managing your SaaS apps, including global settings, user privileges, licenses, files, and their security and compliance posture.

Use Cases

  • Risk Operations Center NEW
  • Endpoint Security
  • Compliance
  • PCI Compliance
  • Cloud Security
  • DevOps
  • Threat Protection
  • Software Supply Chain Risk
  • NIS2

Segments

  • Small Business
  • Mid-Sized Business
  • Enterprise
  • Public Sector

Customers

  • Overview
  • Best Practices
  • Success Stories
  • Testimonials

Resources

  • Resources Library
  • Product Tours
  • Blog
  • Webinars
  • Qualys Stream

Research

  • Threat Research Unit
  • Security Alerts
  • Security Advisories

Support

  • Support Portal
  • Free Training
  • Documentation
  • Community Discussions
  • Knowledgebase
  • Release Notes
  • Release Notifications

Partners

  • Overview
  • Managed Risk Operations Center Program NEW
  • Partner Program
  • VAD Partners
  • VAR Resellers
  • MSP/MSSP Partners
  • Integration Partners
  • Partner FAQs
  • Find Partner

Company

  • About Us
  • Our Team
  • Investor Relations
  • News
  • Awards
  • Events
  • Careers
  • Community
  • Login
  • Contact Us
  • Try Now
  • Try Now
  • Overview
  • Discuss
  • Blog
  • Training
  • Docs
  • Resources
  • US Platform 1
  • US Platform 2
  • US Platform 3
  • US Platform 4
  • CA Platform 1
  • EU Platform 1
  • EU Platform 2
  • EU Platform 3
  • IN Platform 1
  • AE Platform 1
  • UK Platform 1
  • AU Platform 1
  • KSA Platform 1
  • PCI Platform
What’s my Platform?
  • Chat with Us
  • Schedule a Demo
  • +1800 745 4355
  • Request a call or Email
  • Global Offices with Contacts

Free Trials

  • Enterprise TruRisk Platform
  • VMDR
  • CSAM 3.0
  • TotalCloud 2.0
  • Enterprise TruRisk Management
  • Web Application Scanning
  • TruRisk Eliminate
  • Patch Management
  • Policy Compliance
  • TotalAI

Germany press releases.

  • 30. Januar 2024

    Orange Cyberdefense erweitert die Partnerschaft mit Qualys und stärkt das Managed Cybersecurity-Portfolio, um einen End-to-End Vulnerability Intelligence Service anzubieten

Browse press releases

  • AU
  • DE
  • ES
  • FR
  • IN
  • IT
  • NL
  • PT
  • TR
  • UAE
  • UK
  • USA
  • All
    • 2024
    • 2022
    • 2021
    • 2020
    • 2019
    • 2018
    • 2017
    • 2016
    • 2015
    • 2014
    • 2013
    • 2012
    • 2011
    • 2010
    • 2009
    • 2008
    • 2007
    • 2005
    • 2004
    • 2003
    • 2002
    • 2001
    • 2000

    Media inquiries

    Ursula Kafka
    Kafka Kommunikation
    +49 0 89 74747058-0
    [email protected]

    Global media contacts

    Follow us on social media

    De-risk your business. Try the Enterprise TruRisk Platform for free.

    No software to download or install. Seamlessly deploy Cloud Agents and add users to measure, communicate, and eliminate cyber risk across the extended enterprise.

    • Company
    • About Us
    • Investor Relations
    • Partners
    • Events
    • Awards
    • Customers
    • Careers
    • Contact Us
    • Platform
    • Overview
    • Use Cases
    • Segments
    • Free Trials
    • Resources
    • Threat Research Unit
    • Blog
    • Resource Library
    • Sitemap
    • Support
    • Community
    • Release Notes
    © 2025 Qualys, Inc.  All rights reserved.  Privacy Policy.  Accessibility.  Notice at Collection.  Trust.  Cookie Consent.  Do Not Share - Privacy Portal. 
    • Platform
      • | Platform
      • Overview
      • Enterprise TruRisk Platform

        Everything you need to measure, manage, and reduce your cyber risk in one place.

      • Capabilities
      • All
        • | Platform
        • Asset Management
        • CyberSecurity Asset Management (CSAM)

          See entire attack surface, continuously maintain your CMDB, and track EOL/EOS software

          External Attack Surface Management (EASM)

          Gain an attacker’s view of your external internet-facing assets and unauthorized software

        • Vulnerability & Configuration Management
        • TotalAppSec NEW

          Get AI-powered, unified application risk management with web app & API security testing and malware detection all-in-one

          Enterprise TruRisk Management (ETM) NEW

          Consolidate & translate security & vulnerability findings from 3rd party tools

          TotalAI NEW

          Holistic AI security with vulnerability assessment and protection

          Vulnerability Management, Detection & Response (VMDR)

          Discover, assess, prioritize, and patch critical vulnerabilities up to 50% faster

          Enterprise TruRisk Management (ETM)

          Consolidate & translate security & vulnerability findings from 3rd party tools

        • Risk Remediation
        • TruRisk Eliminate (TE) NEW

          Address critical vulnerabilities with flexible, patchless solutions

          Patch Management (PM)

          Efficiently remediate vulnerabilities and patch systems

          Custom Assessment and Remediation (CAR)

          Quickly create custom scripts and controls for faster, more automated remediation

        • Threat Detection & Response
        • Multi-Vector EDR

          Advanced endpoint threat protection, improved threat context, and alert prioritization

        • Compliance
        • Policy Audit NEW

          Reduce risk, and comply with internal policies and external regulations with ease

          File Integrity Monitoring (FIM)

          Reduce alert noise and safeguard files from nefarious actors and cyber threats

        • Cloud Security
        • TotalCloud (CNAPP)

          Cloud-Native Application Protection Platform (CNAPP) for multi-cloud environment.

          Cloud Security Posture Management (CSPM)

          Continuously discover, monitor, and analyze your cloud assets for misconfigurations and non-standard deployments.

          Kubernetes and Container Security (KCS)

          Discover, track, and continuously secure containers – from build to runtime

          Cloud Workload Protection (CWP)

          Detect, prioritize, and remediate vulnerabilities in your cloud environment

          Infrastructure as Code Security (IaC)

          Detect and remediate security issues within IaC templates

          Cloud Infrastructure and Entitlement Management (CIEM)

          Solution to automate the process of managing user entitlements and privileges in cloud environments

          Cloud Detection and Response (CDR)

          Continuous real-time protection of the multi-cloud environment against active exploitation, malware, and unknown threats.

          Cloud Workflow Automation (CWA)

          Qualys Flow is a Low-code/No-code, remediation and workflow automation tool

          SaaS Security Posture Management (SSPM)

          Automate the process of managing your SaaS apps, including global settings, user privileges, licenses, files, and their security and compliance posture.

      • Asset Management
        • | Platform
        • Asset Management
        • CyberSecurity Asset Management (CSAM)

          See entire attack surface, continuously maintain your CMDB, and track EOL/EOS software

          External Attack Surface Management (EASM)

          Gain an attacker’s view of your external internet-facing assets and unauthorized software

      • Vulnerability & Configuration Management
        • | Platform
        • Vulnerability & Configuration Management
        • Enterprise TruRisk Management (ETM) NEW

          Consolidate & translate security & vulnerability findings from 3rd party tools

          TotalAI NEW

          Holistic AI security with vulnerability assessment and protection

          Vulnerability Management, Detection & Response (VMDR)

          Discover, assess, prioritize, and patch critical vulnerabilities up to 50% faster

          Enterprise TruRisk Management (ETM)

          Consolidate & translate security & vulnerability findings from 3rd party tools

          TotalAppSec NEW

          Get AI-powered, unified application risk management with web app & API security testing and malware detection all-in-one

          Web App Scanning (WAS)

          Automate scanning in CI/CD environments with shift left DAST testing

          API Security

          Scan REST/SOAP APIs & check API compliance with shift-left API testing

          Web Malware Detection

          Identify known and zero-day attacks using deep learning-based web malware detection

      • Risk Remediation
        • | Platform
        • Risk Remediation
        • TruRisk Eliminate (TE) NEW

          Address critical vulnerabilities with flexible, patchless solutions

          Patch Management (PM)

          Efficiently remediate vulnerabilities and patch systems

          Custom Assessment and Remediation (CAR)

          Quickly create custom scripts and controls for faster, more automated remediation

      • Threat Detection & Response
        • | Platform
        • Threat Detection & Response
        • Multi-Vector EDR

          Advanced endpoint threat protection, improved threat context, and alert prioritization

      • Compliance
        • | Platform
        • Compliance
        • Policy Audit NEW

          Reduce risk, and comply with internal policies and external regulations with ease

          File Integrity Monitoring (FIM)

          Reduce alert noise and safeguard files from nefarious actors and cyber threats

      • Cloud Security
        • | Platform
        • Cloud Security
        • TotalCloud (CNAPP)

          Cloud-Native Application Protection Platform (CNAPP) for multi-cloud environment.

          Cloud Security Posture Management (CSPM)

          Continuously discover, monitor, and analyze your cloud assets for misconfigurations and non-standard deployments.

          Kubernetes and Container Security (KCS)

          Discover, track, and continuously secure containers – from build to runtime

          Cloud Workload Protection (CWP)

          Detect, prioritize, and remediate vulnerabilities in your cloud environment

          Infrastructure as Code Security (IaC)

          Detect and remediate security issues within IaC templates

          Cloud Infrastructure and Entitlement Management (CIEM)

          Solution to automate the process of managing user entitlements and privileges in cloud environments

          Cloud Detection and Response (CDR)

          Continuous real-time protection of the multi-cloud environment against active exploitation, malware, and unknown threats.

          Cloud Workflow Automation (CWA)

          Qualys Flow is a Low-code/No-code, remediation and workflow automation tool

          SaaS Security Posture Management (SSPM)

          Automate the process of managing your SaaS apps, including global settings, user privileges, licenses, files, and their security and compliance posture.

    • Solutions
      • | Solutions
      • Use Cases
      • Risk Operations Center NEW
      • Endpoint Security
      • Compliance
      • PCI Compliance
      • Cloud Security
      • DevOps
      • Threat Protection
      • Software Supply Chain Risk
      • NIS2
      • Segments
      • Small Business
      • Mid-Sized Business
      • Enterprise
      • Public Sector
    • Customers
      • Customers
      • Overview
      • Best Practices
      • Success Stories
      • Testimonials
    • Resources
      • | Resources
      • Resources
      • Resources Library
      • Product Tours
      • Blog
      • Webinars
      • Qualys Stream
      • Research
      • Threat Research Unit
      • Security Alerts
      • Security Advisories
    • Support
      • Support
      • Support Portal
      • Free Training
      • Documentation
      • Community Discussions
      • Knowledgebase
      • Release Notes
      • Release Notifications
    • More
      • | More
      • Partners
      • Overview
      • Managed Risk Operations Center Program NEW
      • Partner Program
      • VAD Partners
      • VAR Resellers
      • MSP/MSSP Partners
      • Integration Partners
      • Partner FAQs
      • Find Partner
      • Company
      • About Us
      • Our Team
      • Investor Relations
      • News
      • Awards
      • Events
      • Careers

    • Community
      • Community
      • Overview
      • Discuss
      • Blog
      • Training
      • Docs
      • Resources
    • Login
      • Login
      • US Platform 1
      • US Platform 2
      • US Platform 3
      • US Platform 4
      • CA Platform 1
      • EU Platform 1
      • EU Platform 2
      • IN Platform 1
      • AE Platform 1
      • UK Platform 1
      • AU Platform 1
      • KSA Platform 1
      • PCI Platform
      • What’s my Platform?
    • Contact Us
      • Contact Us
      • Chat with Us
      • Schedule a Demo
      • +1800 745 4355
      • Request a call or Email
      • Global Offices with Contacts
    • Try Now