Total visibility of your public cloud deployments.
Cloud computing platform providers operate on a “shared security responsibility” model, meaning you still must protect your workloads in the cloud. Qualys can help.
Complete visibility, and end-to-end IT security and compliance of your AWS deployments and hybrid IT.
Improve risk detection, prevention and response by performing a full set of security and compliance checks on your EC2 Instances, databases and web applications.
Vulnerability management
Policy compliance
File integrity monitoring
Indication of compromise
Web app scanning / firewall
Asset inventory and assessment
Other critical tasks
Monitor and assess your AWS environment against the CIS (Center for Internet Security) AWS Foundations Benchmark. Identify threats caused by misconfigurations, unauthorized access, and non-standard deployments. Get access to clear remediation recommendations so that you can maintain a solid security posture across your AWS resources like VPC, Security Groups, S3, IAM Users and RDS through automated, continuous assessments.
Qualys Container Security (CS) provides security coverage from the build to the deployment stages. Monitor and protect container-native applications on AWS without disrupting your existing Continuous Integration and Deployment (CI/CD) pipelines. Assess the contents of container images for vulnerabilities, control which images are deployed, gain visibility into runtime application activity, and also automatically enforce normal application behavior.
Qualys CS detects vulnerabilities and compliance issues with Docker images in the build pipeline and in AWS ECR, identifies behavioral anomalies and protects container runtimes deployed on AWS ECS, EKS and Fargate.
Natively integrate findings from the Qualys Vulnerability Management, Policy Compliance and Cloud Security Assessment apps into AWS Security Hub. Get real-time visibility into your security and compliance posture directly in the AWS console. Benefit from insights gained from the correlation of Qualys information with other data in AWS Security Hub to enable faster detection and prioritization of risks in AWS environments, enabling rapid automated remediation actions.
Learn more
Enterprise TruRisk Platform, with its robust APIs and native integrations with key DevOps tools, lets you build security into every function in the CI/CD tool chain. This allows developers and ops staff to do security checks, and enables security teams to provide support at the pace of DevOps. Qualys Cloud Agents can be easily embedded into the AMIs or installed on instances. This gives you an ideal way to integrate security at the source and provide complete visibility for elastic cloud workloads. Learn how our customers have implemented secure DevOps, and how you can do it as well.
The Graviton Ready Qualys Cloud Agent provides customers cost savings on AWS’s Graviton2 ARM architecture while leveraging Qualys’ innovative Cloud Platform to protect their critical assets with integrated IT, compliance, and security. The Qualys Cloud Agent enables instant, global visibility of IT assets – with up-to-date asset configuration data for security, compliance, and response.
Enterprise TruRisk Platform sensors are always on, giving you continuous 2-second visibility of all your AWS assets. Remotely deployable, centrally managed and self-updating, the sensors come as physical or virtual appliances, or lightweight agents. Qualys Container Security and Web Application Firewall complement the sensors.
Sync AWS EC2 instances, resources and their associated metadata
Remotely scan instances across VPCs and Regions with pre-authorized scanners
Perform fast and efficient external scans
Complete visibility, and end-to-end IT security and compliance of your hybrid Azure deployments across Azure and Azure Stack.
Gain visibility, security and continuous compliance across your Azure public cloud, Azure Stack private cloud and hybrid infrastructure and workloads from a single-pane interface. Using the same Enterprise TruRisk Platform apps, sensors and analysis engine for both Azure and Azure Stack yields benefits such as:
360-degree view of all Azure assets from a centralized UI
Lower cost
Ease of use
Improve risk detection, prevention and response by performing a full set of security and compliance checks on your Azure virtual machines, databases and web applications.
Vulnerability management
Policy compliance
File integrity monitoring
Endpoint Detection & Response
Web app scanning / firewall
Other critical tasks
Monitor and assess your Azure environment against the CIS (Center for Internet Security) Microsoft Azure Foundations Benchmark. Identify threats caused by misconfigurations, unauthorized access, and non-standard deployments. Through automated, continuous assessments and clear remediation recommendations, you can maintain a solid security posture across your Azure resources like Virtual Networks, Network Security Groups, SQL Servers, and Storage Blobs.
Learn more
Qualys Container Security (CS) provides security coverage from the build to the deployment stages. It lets you monitor and protect container-native applications on Azure without disrupting your existing Continuous Integration and Deployment (CI/CD) pipelines. With Qualys CS, you can assess the contents of container images for vulnerabilities, control which images are deployed, gain visibility into runtime application activity, and also automatically enforce normal application behavior.
Qualys CS detects vulnerabilities and compliance issues with Docker images in the build pipeline and in Azure Container Registry, identifies behavioral anomalies and protects container runtimes deployed on AKS and Azure Container Instances.
Learn more
Azure Security Center – a unified security management and monitoring console – now detects Azure virtual machines and automatically deploys the lightweight Qualys Cloud Agents on them. The agents gather vulnerability data and send it to the Enterprise TruRisk Platform, which in turn provides vulnerability and system health monitoring data back to Azure Security Center.
DEMO: Security built in Azure – not bolted on (02:59)
VIDEO: Integrating Qualys with Microsoft Azure Security Center (04:54)
Qualys assesses the security and compliance posture of Azure Stack, the version of Azure designed for on-premises deployments. You can either deploy Qualys Virtual Scanner Appliances or Qualys Cloud Agents to assess Azure Stack’s control plane infrastructure and workloads.
Learn more
We use Enterprise TruRisk Platform sensors, which are always on, giving you continuous 2-second visibility of all your Azure assets. Remotely deployable, centrally managed and self-updating, the sensors come as physical or virtual appliances, or lightweight agents. Qualys Container Security and Web Application Firewall complement the sensors.
Know what you have in the cloud. Sync Azure virtual machines, resources and their associated metadata information
Remotely scan instances across virtual networks and regions with network scanners. Click and deploy scanners directly from the marketplace
Collect data in real time with our lightweight agent. Pre-deploy into the image or deploy on the VMs after their creation
Learn moreGain a hacker’s perspective with fast and efficient external scans of public facing virtual machines and load balancers
Complete visibility, and end-to-end IT security and compliance of your GCP deployments.
Improve risk detection, prevention and response by performing a full set of security and compliance checks on your GCP compute instances, databases and web applications.
Vulnerability management
Policy compliance
File integrity monitoring
Indication of compromise
Web app scanning / firewall
Other critical tasks
Gain visibility into your GCP projects, and know about the assets like Virtual Machines, Networks, Firewall Rules, Subnetworks and their relationships. Monitor and assess your GCP environment against the CIS (Center for Internet Security) Google Cloud Platform Foundations Benchmark. Identify threats caused by misconfigurations, unauthorized access, and non-standard deployments.
(Beta Coming Soon)
Qualys Container Security (CS) provides security coverage from the build to the deployment stages. Monitor and protect container-native applications on GCP without disrupting your existing Continuous Integration and Deployment (CI/CD) pipelines. Assess the contents of container images for vulnerabilities, control which images are deployed, gain visibility into runtime application activity, and also automatically enforce normal application behavior.
Qualys CS detects vulnerabilities and compliance issues with Docker images in the build pipeline and in Google container registry, identifies behavioral anomalies and protects container runtime deployed on Google Kubernetes Engine.
Natively integrate findings from the Qualys Vulnerability Management and Policy Compliance apps into Google Cloud Security Command Center. Get real-time visibility into your security and compliance posture directly in the GCP console. Benefit from insights gained from the correlation of Qualys information with other data in Google Cloud Security Command Center to enable faster detection and prioritization of risks in GCP environments.
Learn more
We use Enterprise TruRisk Platform sensors, which are always on, giving you continuous 2-second visibility of all your GCP assets. Remotely deployable, centrally managed and self-updating, the sensors come as physical or virtual appliances, or lightweight agents. Qualys Container Security and Web Application Firewall complement the sensors.
Remotely scan instances across virtual networks and regions with network scanners. Click and deploy scanners directly from the marketplace
Collect data in real time with our lightweight agent. Pre-deploy into the image or deploy on the VMs after their creation
Learn moreGain a hacker’s perspective with fast and efficient external scans of public facing virtual machines and load balancers
Enhanced vulnerability management across your OCI environment
Native integration between Qualys Cloud Agent technology and OCI provides continuous Qualys Vulnerability Assessment services for OCI Compute Instances from within OCI’s Vulnerability Scanning Service (VSS).
Hybrid/Multi-cloud findings available in Enterprise TruRisk Platform
OCI Compute Instance findings available in OCI VSS/Cloud Guard
Vulnerability reporting available via the Enterprise TruRisk Platform and in OCI Cloud Guard
Qualys also captures OCI metadata
Improve risk detection, prevention and response by performing a full set of security and compliance checks on your OCI compute instances, databases and web applications.
Vulnerability management
Policy compliance
File integrity monitoring
Indication of compromise
Web app scanning / firewall
Other critical tasks
Gain visibility into your OCI Tenancy, and know about the assets like Compute Instances, Networks, Firewall Rules, Subnetworks and their relationships. Monitor and assess your OCI environment against the CIS (Center for Internet Security) Oracle Cloud Platform Foundations Benchmark. Identify threats caused by misconfigurations, unauthorized access, and non-standard deployments.
Qualys has integrated with the OCI Vulnerability Scanning Service (VSS). By using Qualys’ platform to defend hybrid IT environments, you gain a unified view of your security posture and can apply the same standards and processes on-premises and in the cloud. This can help you reduce your total cost of ownership (TCO) and view all data in one place. When a major attack like Log4j is unleashed, you can quickly assess your risk by running vulnerability scans across your entire environment, understand the extent of your exposure, and act from a single console instead of assembling fragmented information from siloed tools. You can now natively integrate findings from Qualys Vulnerability Management and Policy Compliance apps into OCI and have real-time visibility into your security and compliance posture directly in the OCI console.
We use Enterprise TruRisk Platform sensors, which are always on, giving you continuous 2-second visibility of all your OCI assets. Remotely deployable, centrally managed and self-updating, the sensors come as physical or virtual appliances, or lightweight agents. Qualys Container Security and Web Application Firewall complement the sensors.
Remotely scan instances across virtual networks and regions with network scanners. Click and deploy scanners directly from the marketplace
Collect data in real time with our lightweight agent. Pre-deploy into the image or deploy on the VMs after their creation
Learn moreGain a hacker’s perspective with fast and efficient external scans of public facing virtual machines and load balancers