Cloud Platform
Support

Public cloud integrations.

Total visibility of your public cloud deployments.

Cloud computing platform providers operate on a “shared security responsibility” model, meaning you still must protect your workloads in the cloud. Qualys can help.

  • Identify, classify, and monitor assets and vulnerabilities
  • Comply with internal and external policies
  • Prioritize vulnerability remediation
  • Automatically find and eradicate malware infections on your websites

Highlights

Complete visibility, and end-to-end IT security and compliance of your AWS deployments and hybrid IT.

Built for AWS with Transparent OrchestrationTM

Qualys’ offerings for AWS follow our Transparent Orchestration principle: They simplify AWS security by eliminating friction, and making it intuitive and automated. We accomplish that via Qualys’ native integration with AWS.

2-second visibility across all workloads and PaaS resources

Qualys provides instant, full visibility into your AWS deployments, with details on how instances are being secured and what workloads and resources are running on them.

Continuous assessment of your global security and compliance posture

Qualys continuously monitors and assesses your AWS assets and resources for security issues, misconfigurations and non-standard deployments.

Identify zero-day vulnerabilities and compromised assets

With Qualys, you can continuously detect vulnerabilities, including zero-day bugs being exploited in the wild, pinpoint the AWS assets requiring immediate fixes and prioritize remediation.

Visibility of your AWS deployments

Total visibility of your AWS cloud infrastructure and workloads through a central “single-pane-of-glass” interface.

  • 360-degree view of all AWS assets across multiple accounts, regions from a centralized UI

  • Lower cost

  • Ease of use

  • Nothing to install or manage

AWS workload security

Improve risk detection, prevention and response by performing a full set of security and compliance checks on your EC2 Instances, databases and web applications.

  • Vulnerability management

  • Policy compliance

  • File integrity monitoring

  • Indication of compromise

  • Web app scanning / firewall

  • Asset inventory and assessment

  • Other critical tasks

AWS infrastructure security

Monitor and assess your AWS environment against the CIS (Center for Internet Security) AWS Foundations Benchmark. Identify threats caused by misconfigurations, unauthorized access, and non-standard deployments. Get access to clear remediation recommendations so that you can maintain a solid security posture across your AWS resources like VPC, Security Groups, S3, IAM Users and RDS through automated, continuous assessments.

AWS container security

Qualys Container Security (CS) provides security coverage from the build to the deployment stages. Monitor and protect container-native applications on AWS without disrupting your existing Continuous Integration and Deployment (CI/CD) pipelines. Assess the contents of container images for vulnerabilities, control which images are deployed, gain visibility into runtime application activity, and also automatically enforce normal application behavior.

Qualys CS detects vulnerabilities and compliance issues with Docker images in the build pipeline and in AWS ECR, identifies behavioral anomalies and protects container runtimes deployed on AWS ECS, EKS and Fargate.

Native integration with AWS Security Hub

Natively integrate findings from the Qualys Vulnerability Management, Policy Compliance and Cloud Security Assessment apps into AWS Security Hub. Get real-time visibility into your security and compliance posture directly in the AWS console. Benefit from insights gained from the correlation of Qualys information with other data in AWS Security Hub to enable faster detection and prioritization of risks in AWS environments, enabling rapid automated remediation actions.
Learn more

DevOps security in AWS

Qualys Cloud Platform, with its robust APIs and native integrations with key DevOps tools, lets you build security into every function in the CI/CD tool chain. This allows developers and ops staff to do security checks, and enables security teams to provide support at the pace of DevOps. Qualys Cloud Agents can be easily embedded into the AMIs or installed on instances. This gives you an ideal way to integrate security at the source and provide complete visibility for elastic cloud workloads. Learn how our customers have implemented secure DevOps, and how you can do it as well.

Capital One

Integrating Qualys into DevOps on AWS - Building a Secure AMI Bakery

Capital One

Achieving Instant Visibility of Enterprise Risk Posture

How we secure AWS

Qualys Cloud Platform sensors are always on, giving you continuous 2-second visibility of all your AWS assets. Remotely deployable, centrally managed and self-updating, the sensors come as physical or virtual appliances, or lightweight agents. Qualys Container Security and Web Application Firewall complement the sensors.

AWS Connector

Sync AWS EC2 instances, resources and their associated metadata

Virtual Scanners

Remotely scan instances across VPCs and Regions with pre-authorized scanners

Cloud Agents

Collect data in real time with our lightweight agent

Learn more

Internet Scanners

Perform fast and efficient external scans

Container Security

Assess and monitor container security and compliance

Learn more

Web Application Firewall

Actively block intrusions and secure web applications

Learn more
Subscribe to Qualys in AWS, or try Qualys' free service, CloudView

Highlights

Complete visibility, and end-to-end IT security and compliance of your hybrid Azure deployments across Azure and Azure Stack.

Built for Azure with Transparent OrchestrationTM

Qualys’ offerings for Azure follow our Transparent Orchestration principle: Simplified Azure security through frictionless deployment, intuitive design and automation. The Qualys native integration with Azure makes this possible.

2-second visibility across all workloads and resources

Qualys provides instant, full visibility into your Azure deployments, with details on how virtual machines are being secured and what workloads and resources are running on them.

Continuous assessment of your global security and compliance posture

Qualys continuously monitors and assesses your Azure assets and resources for security issues, misconfigurations and non-standard deployments.

Identify zero-day vulnerabilities and compromised assets

With Qualys, you can continuously detect vulnerabilities, including zero-day software holes being exploited in the wild, pinpoint the Azure assets requiring immediate fixes and prioritize remediation.

Obtain visibility of your Azure deployments

Gain visibility, security and continuous compliance across your Azure public cloud, Azure Stack private cloud and hybrid infrastructure and workloads from a single-pane interface. Using the same Qualys Cloud Platform apps, sensors and analysis engine for both Azure and Azure Stack yields benefits such as:

  • 360-degree view of all Azure assets from a centralized UI

  • Lower cost

  • Ease of use

Secure workloads in Azure

Improve risk detection, prevention and response by performing a full set of security and compliance checks on your Azure virtual machines, databases and web applications.

  • Vulnerability management

  • Policy compliance

  • File integrity monitoring

  • Indication of compromise

  • Web app scanning / firewall

  • Other critical tasks

Assess Azure infrastructure security configuration

Monitor and assess your Azure environment against the CIS (Center for Internet Security) Microsoft Azure Foundations Benchmark. Identify threats caused by misconfigurations, unauthorized access, and non-standard deployments. Through automated, continuous assessments and clear remediation recommendations, you can maintain a solid security posture across your Azure resources like Virtual Networks, Network Security Groups, SQL Servers, and Storage Blobs.
Learn more

Secure container deployments

Qualys Container Security (CS) provides security coverage from the build to the deployment stages. It lets you monitor and protect container-native applications on Azure without disrupting your existing Continuous Integration and Deployment (CI/CD) pipelines. With Qualys CS, you can assess the contents of container images for vulnerabilities, control which images are deployed, gain visibility into runtime application activity, and also automatically enforce normal application behavior.

Qualys CS detects vulnerabilities and compliance issues with Docker images in the build pipeline and in Azure Container Registry, identifies behavioral anomalies and protects container runtimes deployed on AKS and Azure Container Instances.
Learn more

Integrate with Azure Security Center

Azure Security Center – a unified security management and monitoring console – now detects Azure virtual machines and automatically deploys the lightweight Qualys Cloud Agents on them. The agents gather vulnerability data and send it to the Qualys Cloud Platform, which in turn provides vulnerability and system health monitoring data back to Azure Security Center.

DEMO: Security built in Azure – not bolted on (02:59)
VIDEO: Integrating Qualys with Microsoft Azure Security Center (04:54)

Secure Azure Stack infrastructure and workloads

Qualys assesses the security and compliance posture of Azure Stack, the version of Azure designed for on-premises deployments. You can either deploy Qualys Virtual Scanner Appliances or Qualys Cloud Agents to assess Azure Stack’s control plane infrastructure and workloads.
Learn more

How we secure Azure

We use Qualys Cloud Platform sensors, which are always on, giving you continuous 2-second visibility of all your Azure assets. Remotely deployable, centrally managed and self-updating, the sensors come as physical or virtual appliances, or lightweight agents. Qualys Container Security and Web Application Firewall complement the sensors.

Azure Connector

Know what you have in the cloud. Sync Azure virtual machines, resources and their associated metadata information

Virtual Scanners

Remotely scan instances across virtual networks and regions with network scanners. Click and deploy scanners directly from the marketplace

Cloud Agents

Collect data in real time with our lightweight agent. Pre-deploy into the image or deploy on the VMs after their creation

Learn more

Internet Scanners

Gain a hacker’s perspective with fast and efficient external scans of public facing virtual machines and load balancers

Container Security

Assess and monitor container security and compliance across the build, ship and run phases

Learn more

Web Application Firewall

Actively block intrusions and secure web applications

Learn more
Subscribe to Qualys in Azure, or try Qualys' free service, CloudView

Highlights

Complete visibility, and end-to-end IT security and compliance of your GCP deployments.

Built for GCP with Transparent OrchestrationTM

Qualys’ offerings for GCP follow our Transparent Orchestration principle: Simplified GCP security through frictionless deployment, intuitive design and automation. The Qualys native integration with GCP makes this possible.

2-second visibility across all workloads and PaaS resources

Qualys provides instant, full visibility into your GCP deployments, with details on how VM instances are being secured and what workloads and resources are running on them.

Continuous assessment of your global security and compliance posture

Qualys continuously monitors and assesses your GCP assets for security issues, misconfigurations and evaluation against regulatory standards.

Identify zero-day vulnerabilities and compromised assets

With Qualys, you can continuously detect vulnerabilities, including zero-day software holes being exploited in the wild, pinpoint the GCP assets requiring immediate fixes and prioritize remediation.

Visibility of your Google Cloud deployments

Total visibility of your GCP and hybrid workloads through a central “single-pane-of-glass” interface.

  • 360-degree view of all GCP assets across multiple projects, regions from a centralized UI

  • Lower cost

  • Ease of use

Google Cloud workload security

Improve risk detection, prevention and response by performing a full set of security and compliance checks on your GCP compute instances, databases and web applications.

  • Vulnerability management

  • Policy compliance

  • File integrity monitoring

  • Indication of compromise

  • Web app scanning / firewall

  • Other critical tasks

Google Cloud infrastructure security

Gain visibility into your GCP projects, and know about the assets like Virtual Machines, Networks, Firewall Rules, Subnetworks and their relationships. Monitor and assess your GCP environment against the CIS (Center for Internet Security) Google Cloud Platform Foundations Benchmark. Identify threats caused by misconfigurations, unauthorized access, and non-standard deployments.
(Beta Coming Soon)

GCP container security

Qualys Container Security (CS) provides security coverage from the build to the deployment stages. Monitor and protect container-native applications on GCP without disrupting your existing Continuous Integration and Deployment (CI/CD) pipelines. Assess the contents of container images for vulnerabilities, control which images are deployed, gain visibility into runtime application activity, and also automatically enforce normal application behavior.

Qualys CS detects vulnerabilities and compliance issues with Docker images in the build pipeline and in Google container registry, identifies behavioral anomalies and protects container runtime deployed on Google Kubernetes Engine.

Native integration with Google Cloud Security Command Center

Natively integrate findings from the Qualys Vulnerability Management and Policy Compliance apps into Google Cloud Security Command Center. Get real-time visibility into your security and compliance posture directly in the GCP console. Benefit from insights gained from the correlation of Qualys information with other data in Google Cloud Security Command Center to enable faster detection and prioritization of risks in GCP environments.
Learn more

How we secure GCP

We use Qualys Cloud Platform sensors, which are always on, giving you continuous 2-second visibility of all your GCP assets. Remotely deployable, centrally managed and self-updating, the sensors come as physical or virtual appliances, or lightweight agents. Qualys Container Security and Web Application Firewall complement the sensors.

Virtual Scanners

Remotely scan instances across virtual networks and regions with network scanners. Click and deploy scanners directly from the marketplace

Cloud Agents

Collect data in real time with our lightweight agent. Pre-deploy into the image or deploy on the VMs after their creation

Learn more

Internet Scanners

Gain a hacker’s perspective with fast and efficient external scans of public facing virtual machines and load balancers

Container Security

Assess and monitor container security and compliance across the build, ship and run phases

Learn more

Web Application Firewall

Actively block intrusions and secure web applications

Learn more
Subscribe to Qualys in Google Cloud, or try Qualys' free service, CloudView