Continuous Monitoring
Alerts you in real time about network irregularities.
Next-generation cloud service for identifying threats and monitoring unexpected network changes before they turn into breaches
“The Qualys Cloud Agent helps our medical center improve its vulnerability management efforts and achieve the real-time, continuous security the security team sought.”
Information Security Analyst
Handling Cyber Operations a Large,
Regional Medical Center
Highlights
Works with Qualys VM
CM works in tandem with VM so that, from a single console, you can discover hosts and digital certificates, organize assets by business or technology function and be alerted as soon as vulnerabilities appear on your global perimeter. With CM, you can identify and proactively address potential problems.
Global monitoring
CM lets you see your perimeter the way hackers do — directly from the Internet — and acts as a sentinel in the cloud, constantly watching your network for changes that could put you at risk. CM automates monitoring of your global perimeter, tracking systems in your global network, wherever they are.
Targeted alerts
Alerts can be tailored for a wide variety of conditions impacting systems, certificates, ports, services and software. Each rule can be configured to detect common, general changes or tuned to very specific circumstances. You can assign different recipients for each alert, so that the appropriate person is notified.
Immediate insights
The dashboard displays your network’s big-picture status at a glance, giving you a graphical representation of recent activity to spot anomalies. You can flag important alerts or hide trivial ones. A search engine lets you find specific alerts and drill into details with one click.
Combine continuous monitoring and vulnerability management
The deep, native integration between Qualys Continuous Monitoring and Qualys Vulnerability Management generates a new approach to information security in which you continuously identify and proactively address potential problems, instead of waiting to respond to incidents.
A wizard guides you step by step in the process of setting up CM, including configuring your rulesets, your monitoring profiles and your notifications
Be alerted right away about vulnerabilities, misconfigurations and other issues that can put you at risk of breaches, including:
Sharpen and streamline your network security 、
By constantly monitoring your network for changes that could put you at risk, CM gives you a comprehensive and up-to-date view of your IT environment, letting you reap a variety of benefits, including:
Customize alerts
For continuous monitoring and quick detection of security and compliance problems to be effective, it’s also necessary that the appropriate staffers be notified, so that prompt action can be taken. Email notifications feature intuitive layouts and are rich in context and content, giving recipients a succinct yet complete account of events.
Immediate Insights
CM’s dashboard gives you a panoramic, comprehensive, graphics-rich, high-level view of your network, and lets you filter alerts in several ways. You can filter by category — such as Certificate, Host and Vulnerability) — and see all alerts that are configured and applicable within your environment. You can filter by date, so you get all alerts generated within a specified timeframe. These other dashboard features let you:
Powered by the Qualys Cloud Platform
Single-pane-of-glass UI
See the results in one place, in seconds. With AssetView, security and compliance pros and managers get a complete and continuously updated view of all of their IT assets — from a single dashboard interface. Its fully customizable and lets you see the big picture, drill down into details, and generate reports for teammates and auditors. Its intuitive and easy-to-build dynamic dashboards aggregate and correlate all of your IT security and compliance data in one place from all the various Qualys Cloud Apps. With its powerful elastic search clusters, you can now search for any asset – on-premises, endpoints and all clouds – with 2-second visibility.
Centralized & customized
Centralize discovery of host assets for multiple types of assessments. Organize host asset groups to match the structure of your business. Keep security data private with our end-to-end encryption & strong access controls. You can centrally manage users’ access to their Qualys accounts through your enterprise single sign-on (SSO). Qualys supports SAML 2.0-based identity service providers.
Easy deployment
Deploy from a public or private cloud — fully managed by Qualys. With Qualys, there are no servers to provision, no software to install, and no databases to maintain. You always have the latest Qualys features available through your browser, without setting up special client software or VPN connections.
Scalable and extensible
Scale up globally, on demand. Integrate with other systems via extensible XML-based APIs. You can use Qualys with a broad range of security and compliance systems, such as GRC, ticketing systems, SIEM, ERM, and IDS.
© Copyright 2000-2023 COGITO SOFTWARE CO.,LTD. All rights reserved