Qualys   API Connector

Qualys API Connector

Qualys Vulnerability Management (VM) is a cloud service that gives you instantaneous, global visibility into where your IT systems might be vulnerable to the latest Internet threats and how to protect against them.

Qualys API Connector

Example widgets provisioned by our Qualys Vulnerability Management data-suite:

Qualys API Connector

Total Vulnerabilities

Qualys helps your business automate the full spectrum of auditing, compliance and protection of your IT systems and web applications. Continuously and automatically detect vulnerabilities and critical misconfigurations across your global hybrid environment. Get real-time alerts on zero-day vulnerabilities, compromised assets and network irregularities.

Using the latest threat intel, advanced correlation and powerful machine learning, the Qualys Cloud Platform automatically prioritizes the riskiest vulnerabilities and potential threats on your most critical assets—reducing thousands of vulnerabilities to the few hundred that matter.






With so many known vulnerabilities that Qualys is able to detect, it is vital to know the severity of the detected vulnerability. This enables end users to take actions quicker for vulnerabilities with higher severity. Alongside severity Qualys can also detail whether the vulnerability is confirmed or is a potential vulnerability.


Critical Vulnerabilities

Critical Vulnerabilities are those in which intruders can possibly gain control of the host, or there may be potential leakage of highly sensitive information.

For example, vulnerabilities at this level may include full read access to files, potential backdoors, or a listing of all the users on the host..


Exploitable Vulns.

Our service correlates exploitability information with detected vulnerabilities when known exploits are published by third party vendors and/or publicly available sources.

Exploitability information enables you to perform risk-oriented analysis of vulnerabilities and to further prioritize remediation plans. Our service constantly correlates exploitability information from real-time feeds to provide up to date references to exploits and related security resources..


Asset Vulnerabilities.

Qualys VM continuously scans and identifies vulnerabilities with Six Sigma (99.99966%) accuracy, protecting your IT assets on premises, in the cloud and mobile endpoints. Its executive dashboard displays an overview of your security posture and access to remediation details. VM generates custom, role-based reports for multiple stakeholders, including automatic security documentation for compliance auditors.

When VM is paired with Continuous Monitoring (CM), InfoSec teams are proactively alerted about potential threats so problems can be tackled before turning into breaches. You can tailor alerts and be notified about general changes or specific circumstances. CM gives you a hacker’s-eye view of your perimeter, acting as your cloud sentinel.

Example chart types from the Qualys Vulnerability Management data-suite...

Chart types are an enhancement beyond what would be available in the native Qualys platform and are an example Stratiam value-added feature. Actual platform visualisations may differ to what is demonstrated in the concepts below. All charts have linked drill-paths for further data-exploration.

Total Vulnerabilities by Type | Last 12 Months

Click for volumes and break-down.

Total Vulnerabilities by OS | Last 12 Months

Actual platform visualisations may differ. Charts linked to drill-down views.

Vulnerablities by Severity | Potential & Confirmed

Analyse the composition of your vulnerabilities by 'potential' and 'confirmed' vulnerabilities and the severity for each. Actual platform visualisations may differ. Charts linked to drill-down views.

Example Resolution Recommendations

Every detected vulnerability can be linked to a database of known resolution paths, allowing you to quickly take action on vulnerabilities at which you are at greatest risk.

Connecting to Qualys via our API connector is easy, you simply need to request a trial, after which we'll help set you up with your API credentials, select visualisation types and relevant permissions to get started. If you have other data-services you are interested in connecting to, we'd recommend checking out our other data-connectors.