Operationalize Vulnerability and Risk Management — On Demand
QualysGuard® Vulnerability Management (VM) automates the lifecycle of network auditing and vulnerability management across the enterprise, including network discovery and mapping, asset prioritization, vulnerability assessment reporting and remediation tracking according to business risk. Driven by the most comprehensive vulnerability KnowledgeBase in the industry, QualysGuard delivers continuous protection against the latest worms and security threats without the substantial cost, resource and deployment issues associated with traditional software. As an on demand Software-as-a-Service (SaaS) solution, there is no infrastructure to deploy or manage.
QualysGuard VM enables small to large organizations to effectively manage their vulnerabilities and maintain control over their network security with centralized reports, verified remedies, and full remediation workflow capabilities with trouble tickets. QualysGuard provides comprehensive reports on vulnerabilities including severity levels, time to fix estimates and impact on business, plus trend analysis on security issues.
By continuously and proactively monitoring all network access points, QualysGuard VM dramatically reduces security managers' time researching, scanning and fixing network exposures and enables companies to eliminate network vulnerabilities before they can be exploited.
Features of QualysGuard Vulnerability Management
Discover Your Network Environment
Securing your network begins with first knowing every network device and software application that resides within your infrastructure. QualysGuard's remote and agent-less scanning technology is non- intrusive and highly accurate. QualysGuard VM discovers all network devices and applications, including desktops, servers, operating systems, applications, routers, firewalls, PDAs, wireless devices, as well as many other network elements.
Manage Your Network Assets
QualysGuard VM helps you prioritize and fix vulnerabilities intelligently — tailored to your needs. Rapidly identify, visualize and organize your network assets into Business Units and Asset Groups. Define your "mission critical" assets by their importance to your business operations using a 5 tier rating system from Low to Critical.
Identify Network Security Vulnerabilities
Driven by the largest and most up-to-date KnowledgeBase of vulnerability checks in the industry, QualysGuard's external and internal scanners safely and accurately detect security vulnerabilities across your entire network. As an on demand service, new signatures are delivered weekly, giving users the ability to scan for the latest threats. QualysGuard's extremely accurate scans eliminate the time drain of chasing false positives, false negatives and host crashes.
Analyze Threats with Powerful Reporting
Intuitive and easy-to-read reports provide both executive-level summaries and detailed technical analysis. QualysGuard VM provides a detailed description for each vulnerability that includes: the security threat, consequences if the vulnerability is exploited, and the recommended solution to fix the vulnerability, including links to the appropriate patches. QualysGuard provides powerful reporting options. You can build your own customized reports, or use the report templates provided by Qualys.
Manage and Eliminate Your Network Vulnerabilities
QualysGuard's integrated remediation and trouble-ticketing workflow system is highly automated. The system generates tickets based o your policy rules and tracks each vulnerability until it is verifiably fixed. Each remediation ticket is assigned a unique number and includes: general information, vulnerability details, remediation history and actions. During the next scan, QualysGuard automatically verifies that vulnerabilities are fixed and automatically closes the tickets. QualysGuard VM also provides an array of remediation reports providing security managers with a current snapshot on remediation status and progress.
Benefits of QualysGuard Vulnerability Management
Automates all steps of vulnerability assessment, management and threat reduction.
Accurate and always up-to-date vulnerability audits.
Trusted, unbiased third-party security auditing and compliance reporting meets industry and regulatory compliance requirements.
Discover all assets across the entire network.
Easy-to-use, Comprehensive Reporting.
Integrated remediation and trouble-ticketing workflow.
Turnkey deployability and unprecedented scalability requires no software to install, update or maintain.
Cost efficient with no hidden costs across the entire network.
Lower and Predictable TCO. On demand SaaS technology offers significant economic advantages with no capital expenditures, extra human resources or infrastructure to deploy and manage.
Secure, with complete end-to-end data encryption.