Qualys Continuous Monitoring

Qualys Continuous Monitoring (CM) is a next-generation cloud service that gives you the ability to identify threats and unexpected changes in your Internet perimeter before they turn into breaches. With it, you can track what happens within Internet-facing devices throughout your DMZs and cloud environments – anywhere in the world.

Continuous Monitoring brings a new approach to vulnerability management and network security, enabling you to immediately identify and proactively address potential problems such as:

  • Unexpected Hosts/OSes
  • Expiring SSL Certificates
  • Inadvertently Open Ports
  • Severe Vulnerabilities
  • Undesired

What’s different about Qualys CM?

Continuous Monitoring gives you a hackers-eye view of your perimeter systems – from the Internet. It detects changes in your perimeter that could be exploited and immediately notifies the IT staff responsible for the affected assets so they can take appropriate action.

Built on the world’s leading Cloud security and compliance platform, Continuous Monitoring requires no special hardware and can be set up with a few simple clicks. It complements the speed of deployment, unparalleled scalability, and accuracy of Qualys Vulnerability Management and, soon, other services in the Qualys platform. Together, they help you identify the highest priorities and accelerate your ability to fix potential security holes before they can be breached.

Cloud Platform

Global Scalability & Manageability powered by the Qualys Cloud

As part of the award-winning Qualys Cloud Platform, Continuous Monitoring is designed specifically to be efficient and easy to use, whether you have a handful of perimeter systems in one location or thousands of devices spread throughout the world.

  • Immediate deployment – no hardware to set up,
    always up-to-date
  • Global scalability – add new perimeter networks anytime, throughout the world
  • Multiple, unified solutions – one console for CM,
    VM and more
  • Centralized management – apply alerting policies consistently across all your perimeter systems

Integrated Perimeter Security: The power of VM, made instantly actionable with CM

Qualys Continuous Monitoring (CM) works together with Qualys Vulnerability Management (VM) to provide true proactive perimeter security. From a single console, you can discover hosts and digital certificates, organize assets by business function or technology, and set up automated, targeted alerts – for systems anywhere in the world. The Qualys Cloud Platform keeps everything in sync, avoiding the redundancies and gaps that come with trying to glue together disparate, siloed solutions.

Global Monitoring

Hackers-Eye View of Your Perimeter –
from the Internet

To stop hackers, you have to see your perimeter the same way they do – directly from the Internet. Continuous Monitoring acts as a sentinel in the cloud: constantly watching your network for changes that could leave you exposed.

Automated Monitoring of Your Global Perimeter

Continuous Monitoring efficiently tracks the systems in your Internet perimeter, whether they are in one location, located in cloud environments, or spread across the globe. It takes advantage of your Qualys asset and scan definitions to provide immediate alerting without complicated setup or configuration.

Targeted Alerts

Fine-grained control over when to generate an alert

With Continuous Monitoring, you can tailor alerts to a wide variety of conditions so that you can watch broadly for general changes or zero in on specific circumstances.

  • Hosts & Devices – see whenever systems appear, disappear, or are running unexpected operating systems.

  • Digital Certificates – track SSL certificates used on systems to know if they are weak or self-signed, and when they’re due to expire.

  • Ports & Services – keep tabs on which network ports are open, which protocols are used, and whether they change over time.

  • Vulnerabilities on Hosts or in Applications – know when potential or confirmed vulnerabilities appear (or reappear), how severe they are, whether they can be exploited, and if patches are available.

  • Applications Installed on Perimeter Systems – find out when application software gets installed or removed from these systems.

Efficient alerts, directed to responsible IT staff

Continuous Monitoring gives you control over exactly who receives each alert, so that you can directly notify the most appropriate staff in each circumstance. This frees your security teams from the delays and burdens of waiting for scheduled scanning windows and sifting through long reports.

Immediate Insights

Visual dashboard shows you the status of your perimeter at a glance

You can immediately see the big picture in your perimeter with Continuous Monitoring’s visual dashboard. A quick overview and graphical representation of recent activity helps you spot anomalies. Flag important alerts or hide ones you don’t want to see. Then, find particular alerts quickly with rich interactive search, and drill into the details with a simple click.

Qualys is trusted by the majority of the Forbes Global 100
and thousands of organizations big and small!

Company Logos of Qualys Customers

Customer Testimonials

Qualys Cloud Platform

& Integrated Suite of Security & Compliance Applications

Qualys solutions can also be purchased a la carte — as your security needs grow.
There’s nothing to install or maintain.

Qualys Solutions
Qualys Community
Free Trial & Tools
Free Trial

Nothing to install or download!

1 (800) 745 4355