SAN FRANCISCO, CA--(Marketwired - Apr 21, 2015) - RSA Conference USA 2015, Booth #N3421 - Qualys, Inc. (
Today's cyber attacks are often a result of cyber criminals scanning and attacking networks on a continuous basis, coupled with an event-driven approach to monitoring an organization's perimeter. As a result, vulnerable machines can be exploited within hours with toxic combinations of scenarios that can lead to compromises in their IT environments such as zero-days and phishing scams, which can instantly expose an organization's data. Qualys Continuous Monitoring provides a real-time view of an entire organization, and immediately notifies the IT staff as changes are detected so they can take appropriate action.
Qualys Continuous Monitoring allows organizations to continuously monitor and respond to changes in their internal environment such as new hosts, OS changes, open ports and services, SSL certificates, as well as changes in vulnerabilities and software.
"Network perimeters are rapidly evolving and expanding. Enterprise data no longer lives solely in the data center but is shared across remote locations and devices, making networks susceptible to cyber attacks," said Philippe Courtot, Chairman and CEO for Qualys, Inc. "Our Continuous Monitoring solution helps customers proactively monitor, identify and alert them to unexpected changes in all their critical IT assets before they turn into breaches."
Built on the world's leading cloud security and compliance platform, Qualys CM requires no special hardware and can be set up with a few simple clicks. A user simply needs to identify the host or hosts that need to be monitored, who to alert when states change, and what that change might be. The solution complements the speed of deployment, unparalleled scalability, and accuracy of Qualys Vulnerability Management and other services in the Qualys Cloud Platform.
Analyst Perspective
Neil MacDonald, VP Distinguished Analyst, Gartner
Peter Firstbrook, Research VP, Gartner
"All organizations should now assume that they are in a state of continuous compromise. However, organizations have deluded themselves into believing that 100% prevention is possible, and they have become overly reliant on blocking-based and signature-based mechanisms for protection." Gartner recommends you, "Develop a security operations center that supports continuous monitoring and is responsible for the continuous threat protection process."*
Availability
Qualys Continuous Monitoring for internal scanning is now available and sold via annual subscription, based on the number of IPs. To learn more about Continuous Monitoring or see a demo, visit https://www.qualys.com/CM.
Additional Resources
- Learn more about Qualys Continuous Monitoring
- Register for a demo of Qualys Continuous Monitoring for internal scanning
- Follow Qualys on LinkedIn and Twitter
*Gartner, Designing an Adaptive Security Architecture for Protection From Advanced Attacks, Neil MacDonald, Peter Firstbrook, 12 February 2014
About Qualys, Inc.
Qualys, Inc. (
Qualys, the Qualys logo and QualysGuard are proprietary trademarks of Qualys, Inc. All other products or names may be trademarks of their respective companies.
Contact Information:
MEDIA CONTACTS
Melissa Liton
Qualys, Inc.
(650) 801-6242
Michelle Kincaid
LEWIS PR on behalf of Qualys
(415) 432-2467