Qualys Continuous Monitoring
Qualys Continuous Monitoring (CM) is a next-generation cloud service that gives you the ability to identify threats and unexpected changes in your Internet perimeter before they turn into breaches. With it, you can track what happens within Internet-facing devices throughout your DMZs and cloud environments – anywhere in the world.
Continuous Monitoring brings a new approach to vulnerability management and network security, enabling you to immediately identify and proactively address potential problems such as:
- Unexpected Hosts/OSes
- Expiring SSL Certificates
- Inadvertently Open Ports
- Severe Vulnerabilities
What’s different about Qualys CM?
Continuous Monitoring gives you a hackers-eye view of your perimeter systems – from the Internet. It detects changes in your perimeter that could be exploited and immediately notifies the IT staff responsible for the affected assets so they can take appropriate action.
Built on the world’s leading Cloud security and compliance platform, Continuous Monitoring requires no special hardware and can be set up with a few simple clicks. It complements the speed of deployment, unparalleled scalability, and accuracy of Qualys Vulnerability Management and, soon, other services in the Qualys platform. Together, they help you identify the highest priorities and accelerate your ability to fix potential security holes before they can be breached.
Global Scalability & Manageability powered by the Qualys Cloud
As part of the award-winning Qualys Cloud Platform, Continuous Monitoring is designed specifically to be efficient and easy to use, whether you have a handful of perimeter systems in one location or thousands of devices spread throughout the world.
- Immediate deployment – no hardware to set up,
- Global scalability – add new perimeter networks anytime, throughout the world
- Multiple, unified solutions – one console for CM,
VM and more
- Centralized management – apply alerting policies consistently across all your perimeter systems
Integrated Perimeter Security: The power of VM, made instantly actionable with CM
Qualys Continuous Monitoring (CM) works together with Qualys Vulnerability Management (VM) to provide true proactive perimeter security. From a single console, you can discover hosts and digital certificates, organize assets by business function or technology, and set up automated, targeted alerts – for systems anywhere in the world. The Qualys Cloud Platform keeps everything in sync, avoiding the redundancies and gaps that come with trying to glue together disparate, siloed solutions.
Hackers-Eye View of Your Perimeter –
from the Internet
To stop hackers, you have to see your perimeter the same way they do – directly from the Internet. Continuous Monitoring acts as a sentinel in the cloud: constantly watching your network for changes that could leave you exposed.
Automated Monitoring of Your Global Perimeter
Continuous Monitoring efficiently tracks the systems in your Internet perimeter, whether they are in one location, located in cloud environments, or spread across the globe. It takes advantage of your Qualys asset and scan definitions to provide immediate alerting without complicated setup or configuration.
Fine-grained control over when to generate an alert
With Continuous Monitoring, you can tailor alerts to a wide variety of conditions so that you can watch broadly for general changes or zero in on specific circumstances.
Hosts & Devices – see whenever systems appear, disappear, or are running unexpected operating systems.
Digital Certificates – track SSL certificates used on systems to know if they are weak or self-signed, and when they’re due to expire.
Ports & Services – keep tabs on which network ports are open, which protocols are used, and whether they change over time.
Vulnerabilities on Hosts or in Applications – know when potential or confirmed vulnerabilities appear (or reappear), how severe they are, whether they can be exploited, and if patches are available.
Applications Installed on Perimeter Systems – find out when application software gets installed or removed from these systems.
Efficient alerts, directed to responsible IT staff
Continuous Monitoring gives you control over exactly who receives each alert, so that you can directly notify the most appropriate staff in each circumstance. This frees your security teams from the delays and burdens of waiting for scheduled scanning windows and sifting through long reports.
Visual dashboard shows you the status of your perimeter at a glance
You can immediately see the big picture in your perimeter with Continuous Monitoring’s visual dashboard. A quick overview and graphical representation of recent activity helps you spot anomalies. Flag important alerts or hide ones you don’t want to see. Then, find particular alerts quickly with rich interactive search, and drill into the details with a simple click.
Qualys is trusted by the majority of the Forbes Global 100
and thousands of organizations big and small!