Top 10 questions from prospective partners.
Qualys provides on-demand vulnerability assessment and management through a Web services platform. Qualys offers:
Qualys enables users to measure their vulnerability status and enforce corporate remediation standards in order to comply with corporate and government data security policies.
There are many reasons to perform regular vulnerability assessments, including:
Prevent business loss — System downtime, lost revenue, cleanup costs, and loss of trade secrets due to network compromises cost businesses millions each year. Hacks cost an average of $53,000 each for response, investigation, recovery, and prosecution, not including the potentially immeasurable business cost of lost proprietary or confidential data.
Everyone is a target for attack — Today, everyone with an Internet connection is a potential target for attack. A 2002 CIA/FBI survey showed that 90% of respondents had detected security breaches within the last 12 months. Even if your network does not hold any data that an attacker would want, it can still serve as a launching pad for attacks on others. Automated attack tools - such as worms like Blaster - simply look for vulnerable hosts, without consideration of who owns them. Unauthorized wireless access points are now becoming commonplace, providing an additional attraction to potential hackers.
Perimeter Defenses are no longer sufficient — Worms such as SQL Slammer and Blaster use covert channels to target internal networks, proving that traditional perimeter defense mechanisms alone (such as IDS, Anti Virus, and Firewalls) cannot provide adequate protection from the latest generation of attacks.
Regulatory compliance — Privacy regulations such as Gramm-Leach-Bliley Act (GLBA), HIPAA, SB1386 and Sarbanes-Oxley carry requirements for protecting the privacy and confidentiality of patient, customer and financial data, with legal and monetary penalties for failures to comply. Today, almost all companies doing business over the Internet- directly or through partners are subject to some form of compliance regulation.
Business and Trading Partner security — Companies with extranets that support partnerships, supply-chain management, and other business processes need to be sure that their partners’ networks have been secure, and that their own network does not threaten their partners’ data security.
Qualys is solely and exclusively focused on building the best vulnerability management solution available. As the market leading Web service for vulnerability management, we focus our resources on innovation, quality assurance and customer support for the following competitive advantages.
Accuracy — Third party analysis demonstrated that Qualys maintains the most comprehensive list of critical security vulnerabilities (nearly twice that of our nearest competitor). More important than shear number is Qualys’ accuracy. Unlike open source solutions, Qualys continually checks the accuracy of all reported vulnerabilities, patches and fixes. Through continuous improvement and monitoring, Qualys has virtually eliminated false positive and false negatives, making Qualys the solution you and your customers can rely on.
Always Up to Date — Since all scanning accesses the latest Qualys vulnerability database, customers are protected from the latest vulnerabilities. Qualys updates its databases three times a day, and automatically checks that remedies and links remain valid.
Distributed Scanning With Centralized Reports — Global scanning infrastructure inside and outside the firewall.
Lowest Cost of Ownership — There are no hidden costs for hardware, supporting software or labor to install or maintain Qualys over time. These costs tend to be $3-5 per $1 of software for other solutions. Qualys automatically consolidates data into professional reports, a difficult and time consuming activity for standalone solutions. Finally, industry-leading accuracy means that users do not need to waste time investigating false positives, one of the biggest hidden costs of vulnerability scanning.
Performance — Because Qualys accurately identifies types of devices, operating systems, versions and available ports, our inference-based scanning engine is able to very efficiently scan for applicable vulnerabilities, making Qualys among the fastest scanners available. Our hosted scanning service automatically distributes scanning workload among multiple servers worldwide to provide an unmatched scalability for large, multi-location scans.
Easy to Implement/Maintain — A Web service uses the Internet as its infrastructure, and can therefore be deployed in minutes anywhere. Updates and maintenance occur automatically. Training on Qualys is minimal. In just a few hours, a professional can become proficient at using and applying the full suite of Qualys capabilities. All of this allows an organization to focus IT and security resources on supporting its core business, not on managing their vulnerability assessment solution.
Pure SaaS Model — Qualys does not provide professional services, managed services or consulting.
There are many reasons to partner with Qualys, depending upon the type of business you are in.
While accurate vulnerability management is critical to protecting information security, we recognize that it is only one piece of a comprehensive security program. Qualys seeks partners who:
Having built a strong brand and reputation for quality and integrity, Qualys seeks partners who will invest time in training and development to provide a valuable, accurate and ethical representation of Qualys’ security services to our mutual customers.
Qualys provides a variety of tools to make our partners successful. These include:
In addition, Qualys provides marketing, telesales and field sales support to help our partners in the education and sales process.
Finally, as a hosted service, Qualys provides a turnkey solution for your customers, including technical support, allowing our partners to focus on their core business.
A central feature of Qualys service is secure storage of centralized vulnerability data. By maintaining encrypted scan results in a secure data vault, accessible only by the account owner or designee, Qualys is able to provide the highest level of data protection for our clients, an indelible audit trail of data access, and the ability to create consolidated and historical trend reports that are simply not possible with traditional software VA scanners.
Software solutions that leave sensitive scan results on a corporate network, standalone PC or laptop leave a company vulnerable to having these machines compromised by the very vulnerabilities and attacks they are trying to prevent! In addition, this data may be taken offsite, lost, accessed, used or misused without ever leaving a history or audit trail.
The Qualys Web service is designed around secure standards designed to protect again these problems.
These security features cannot be replicated in software solutions. This is why thousands of customers, including government, financial institutions and health care providers, trust their data and security to Qualys.
Partner training is a key component and requirement of Qualys partner program. Qualys typically provides on-site training at Qualys for a limited number of key partner employees.
Large partner organizations are typically trained via a 2-3 hour Webinar. At the end of this Webinar, practitioners are able to competently demonstrate and use the Qualys solution. In addition, they will be prepared to discuss key security drivers and concerns, present Qualys advantages and business case, and address common issues and objections. A short test will be made available shortly to help “certify” representatives to represent and refer Qualys to your customers.
Qualys conducts regular Webinars on special topics of interest to partners, including industry trends and new product developments. Qualys also provides a wide variety of on-line training and marketing resources to help keep our partners up to date on the latest information about Qualys and security.
Any organization or enterprise that has a concern for data protection and privacy can benefit from the Qualys solution. Vertical markets with either subject to information security regulations (e.g., financial institutions, retail and on-line merchants, health care, government, pharmaceutical organizations) and/or network and data intensive groups (e.g., high-technology manufacturing, state universities, entertainment, and transportation) are frequent purchasers of Qualys. These organizations may have a Chief Security Officer, or similar high-level individual assigned to manage corporate security. However, recent security legislation and highly publicized attacks have brought in interest from enterprises in all industries.
Organizations that have an existing open source or software vulnerability scanning solution are ideal candidates, as they understand the value of scanning and have experienced firsthand the challenges, limitations and costs of working with other solutions.
To begin the partner application process, please fill out the following form: Become a Partner. This will allow us to learn more about your company and provide the best possible support to you. Qualys will review your application promptly and contact you shortly with additional details.
Together, we will make sure that there is a good fit between our organizations, and identify next steps, including any necessary non-disclosure agreements, to move forward.