Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Qualys Introduces Cloud-based Continuous Monitoring

SAN FRANCISCO – RSA CONFERENCE 2014 – Qualys, a provider of cloud security and compliance solutions, this week added Continuous Monitoring to its flagship QualysGuard suite of applications for security and compliance.

SAN FRANCISCO – RSA CONFERENCE 2014 – Qualys, a provider of cloud security and compliance solutions, this week added Continuous Monitoring to its flagship QualysGuard suite of applications for security and compliance.

According to Qualys, the new offering gives organizations the ability to proactively identify threats and unexpected changes in Internet-facing devices within their DMZ, cloud-based environments, and web applications.

Qualys Logo

“It brings a new paradigm to vulnerability management, empowering customers to continuously monitor mission-critical assets throughout their perimeter and immediately get alerted to anomalies that could expose them to cyber attacks.

Built on the QualysGuard Cloud Platform, the service allows companies to continuously monitor:

Hosts and devices exposed to the Internet – to see whenever systems appear, disappear, or are running unexpected operating systems.

Digital certificates – to track SSL certificates used on systems to know if they are weak or self-signed, and when they’re due to expire.

Ports and services open on each system – to keep tabs on which network ports are open, which protocols are used, and whether they change over time.

Vulnerabilities on hosts or applications – to know when vulnerabilities appear (or reappear), whether they can be exploited, and if patches are available.

Applications installed on perimeter systems – to find out when application software gets installed or removed from these systems.

Available immediately in Beta for all QualysGuard customers, the new Continuous Monitoring solution is scheduled for general availability on March 27, 2014.

Pricing starts at $295 for small businesses and $1,995 for larger enterprises, and is sold as annual subscriptions based on the numbers of perimeter IPs being monitored.

Related Reading: Continuous Monitoring and the Confusion It Causes

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cybersecurity Funding

Forward Networks, a company that provides network security and reliability solutions, has raised $50 million from several investors.

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Cisco patched a high-severity SQL injection vulnerability in Unified Communications Manager (CM) and Unified Communications Manager Session Management Edition (CM SME).

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...