Qualys Vulnerability Management (VM) is a cloud service that gives you instantaneous, global visibility into where your IT systems might be vulnerable to the latest Internet threats and how to protect against them.
Qualys helps your business automate the full spectrum of auditing, compliance and
protection of your IT systems and web applications. Continuously and
automatically detect vulnerabilities and critical misconfigurations across your
global hybrid environment. Get real-time alerts on zero-day vulnerabilities,
compromised assets and network irregularities.
Using the latest threat intel, advanced correlation and powerful machine learning, the Qualys Cloud Platform automatically prioritizes the riskiest vulnerabilities and potential threats on your most critical assets—reducing thousands of vulnerabilities to the few hundred that matter.
With so many known vulnerabilities that Qualys is able to detect, it is vital to know the severity of the detected vulnerability. This enables end users to take actions quicker for vulnerabilities with higher severity. Alongside severity Qualys can also detail whether the vulnerability is confirmed or is a potential vulnerability.
Critical Vulnerabilities are those in which intruders can possibly gain control
of the host, or there may be potential leakage of highly sensitive information.
For example, vulnerabilities at this level may include full read access to files, potential backdoors, or a listing of all the users on the host..
Our service correlates exploitability information with detected vulnerabilities
when known exploits are published by third party vendors and/or publicly
Exploitability information enables you to perform risk-oriented analysis of vulnerabilities and to further prioritize remediation plans. Our service constantly correlates exploitability information from real-time feeds to provide up to date references to exploits and related security resources..
Qualys VM continuously scans and identifies vulnerabilities with Six Sigma
(99.99966%) accuracy, protecting your IT assets on premises, in the cloud and
mobile endpoints. Its executive dashboard displays an overview of your security
posture and access to remediation details. VM generates custom, role-based
reports for multiple stakeholders, including automatic security documentation
for compliance auditors.
When VM is paired with Continuous Monitoring (CM), InfoSec teams are proactively alerted about potential threats so problems can be tackled before turning into breaches. You can tailor alerts and be notified about general changes or specific circumstances. CM gives you a hacker’s-eye view of your perimeter, acting as your cloud sentinel.
Chart types are an enhancement beyond what would be available in the native Qualys platform and are an example Stratiam value-added feature. Actual platform visualisations may differ to what is demonstrated in the concepts below. All charts have linked drill-paths for further data-exploration.
Scroll to select specific time-range. Sample data only.
Click for volumes and break-down.
Actual platform visualisations may differ. Charts linked to drill-down views.
Analyse the composition of your vulnerabilities by 'potential' and 'confirmed' vulnerabilities and the severity for each. Actual platform visualisations may differ. Charts linked to drill-down views.
Every detected vulnerability can be linked to a database of known resolution paths, allowing you to quickly take action on vulnerabilities at which you are at greatest risk.
Connecting to Qualys via our API connector is easy, you simply need to request a trial, after which we'll help set you up with your API credentials, select visualisation types and relevant permissions to get started. If you have other data-services you are interested in connecting to, we'd recommend checking out our other data-connectors.