0% found this document useful (0 votes)
229 views40 pages

Qualys Cloud Platform Whitepaper

The document discusses how modern IT environments have become distributed, elastic and hybrid due to digital transformation initiatives which pose security challenges. It introduces the Qualys Cloud Platform as a solution that can provide continuous monitoring and protection across hybrid IT environments through various sensors, appliances and apps on its platform.

Uploaded by

Zoumana Diomande
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
229 views40 pages

Qualys Cloud Platform Whitepaper

The document discusses how modern IT environments have become distributed, elastic and hybrid due to digital transformation initiatives which pose security challenges. It introduces the Qualys Cloud Platform as a solution that can provide continuous monitoring and protection across hybrid IT environments through various sensors, appliances and apps on its platform.

Uploaded by

Zoumana Diomande
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

Qualys

Cloud
Platform
One stack to consolidate traditional
enterprise security and compliance
solutions and secure the digital
transformation
White paper | Qualys Cloud Platform

Table of Contents
Introduction 3

The modern IT environment: borderless, distributed, elastic 4


Hybrid IT: A security challenge Snapshot 5
The new boundaries of your IT landscape 6
How can you monitor and protect this far-reaching environment? 7

Qualys Cloud Platform 8


Introduction 9
Overview of the Qualys Cloud Platform 9
The ideal architecture for securing digital transformation initiatives 10

How it operates 12
Versatile set of sensors 13
Qualys appliances 14
Passive Network Sensor 15
Qualys Cloud Agent 16
Qualys Cloud Apps 17

Back-end data categorization, visualization and analysis 22


Advantages of our cloud-based architecture 24
Our apps and services are delivered either via our public cloud platform, 25
or private cloud platform

Qualys Subscriptions 27
SMB, mid-size, enterprise, consultant and MSPs, government 27
Community Edition 30

Comprehensive training and support 31

Customers 32
Customer base 33
Geisinger Health Systems 34
Synovus Financial Corp 35

The future 36
A peek at what's coming 37

2
White paper | Qualys Cloud Platform

Introduction

“Qualys helps us to make sure that


As organizations digitally transform business processes
our network is secure and that
to boost agility and efficiency, IT environments become
distributed, elastic and hybrid — a challenge for security our systems, and those of our
teams. CISOs are no longer well served by conventional customers, are hardened as well.”
security products designed to protect traditional, well-
defined corporate perimeters where most assets are on Senior Manager,
premises. GIT Security Engineering Team

With the adoption of cloud, mobility, virtualization, and


other innovations, IT infrastructure frontiers have been
pushed out, blurred, and even erased. To regain visibility projects by continuously and quickly developing and
and control over these new amorphous IT environments, delivering code. If security remains isolated and is
CISOs often resort to accumulating heterogeneous point jammed in at the end before software is deployed, it
tools, an ineffective and counterproductive approach. will slow down DevOps’ continuous development and
delivery, and erase digital transformation benefits.
Because it’s difficult to integrate, manage and scale
a plethora of disparate security products, this strategy In short, the Qualys Cloud Platform continuously
results in operational silos, increased costs and data assesses organizations’ security and compliance posture,
fragmentation. Worse, it leaves organizations exposed with instant visibility across all IT assets — on premises,
to opportunistic hackers who take advantage of in clouds, and at remote endpoints — for continuous
attack vectors created by the speed, openness and monitoring and response.
interconnectedness of modern IT.
As Robert Ayoub, IDC’s Research Director of Security
Instead, security must be orchestrated Products, recently stated: “The Qualys Cloud Platform
simplifies the complexity associated with managing
transparently into digital transformation
multiple security solutions, while at the same time
projects. This requires a unified security increasing the automation, effectiveness and proactive
and compliance platform for prevention, nature of security.”
detection and response.
Read on to learn how our platform consolidates and
Qualys saw this shift coming many years ago. Guided by automates security and compliance tasks, and protects
its pioneering vision, Qualys has been crafting its hybrid IT environments, via its versatile sensors,
integrated cloud platform to meet the challenges of the back-end analysis engine and integrated suite of apps.
digital era’s increased attack surface.

With Qualys, organizations can build security natively


and organically into hybrid IT infrastructures, instead
of abruptly bolting it on, as has been done traditionally.

This includes meshing and automating security into


DevOps pipelines, which power digital transformation
3
Part I

The Modern IT
Environment: Borderless,
Distributed, Elastic
White paper | Qualys Cloud Platform

Hybrid IT: A Security Challenge Snapshot


The new information security challenges that cloud
computing, mobility and other IT innovations have created
for IT departments are well exemplified by this hypothetical
but very common scenario of a retailer’s payments app:

The app’s control panel can be The app’s back-end process


accessed by an admin sitting in runs in an on-premises data
a hotel lobby from a laptop center.
connected to a public Wi-Fi network.

The front end runs on a public


cloud environment such as
Google Cloud, Amazon AWS or
Microsoft Azure.

The risk to this one application rests in these three


different places. Security products that protect only
the endpoint, or only the cloud instance, or only the
on-premises server fall short. Attempting to assemble
a more comprehensive solution by tying together
heterogeneous products creates integration complexity,
higher costs and, very likely, poor performance.

5
White paper | Qualys Cloud Platform

The new boundaries of your IT landscape


Perimeters were formerly contained to corporate
premises, but now they extend to clouds, mobile devices,
web apps, IoT sensors and even to non-computing
products.

Mobile devices, non-computing appliances compliance checks on public cloud deployments, as they
do for their on-premises systems, including vulnerability
and IoT systems
management, web app scanning, and policy compliance.
Your perimeter reaches out to every device employees To do so, they need security tools that give them visibility
connect to public and home Wi-Fi networks: Laptops, into their public cloud workloads and instances.
smartphones, tablets and smartwatches. These digital
travel companions contain critical confidential data and Web apps and Dev(Sec)Ops pipelines
applications, and are often lost, stolen, and compromised.
As organizations digitally transform operations,
these innovations are primarily delivered via web apps:
Another weak link: Organizations’ geographically dispersed
Internet-facing, internal and cloud-hosted web apps,
locations, such as remote offices and retail stores. These
as well as REST API-based web services. With these web
facilities, which house PCs, point-of-sale systems and other
apps, organizations simplify and automate key functions
endpoints, often have weaker physical and cyber security
and processes for employees, customers and partners.
than larger corporate buildings.
Unfortunately, many web applications are unsafe
due to latent vulnerabilities and weak configurations.
Meanwhile, non-computing devices are connecting to your
Unsurprisingly, they’ve become a favorite vector for
network, including copiers, printers, thermostats and even
data breaches.
Wi-Fi enabled coffee makers in office kitchens.

A key element for hardening web apps is the integration


Businesses are also aggressively adopting IoT and
of security checks throughout the DevOps pipelines
embedding sensors in myriad “things” that were formerly
where software code is quickly and continuously built
offline: Vehicles, HVAC systems, healthcare instruments,
and deployed. When security is meshed in, this process
industrial equipment and store shelves. These diverse and
becomes a DevSecOps pipeline, in which vulnerabilities
dispersed endpoints now collect troves of sensitive data
and mis-configurations are automatically detected and
and transmit it back to their organizations’ IT systems.
fixed at every step — from the ‘build’ to the ‘production’
stages. That way, security isn’t brought in at the end,
Thus, it’s essential for organizations to have tools
delaying the CI/CD (continuous delivery / integration)
that let them monitor and strengthen the security and
of code that powers digital transformation efforts.
compliance of mobile and non-traditional endpoints,
particularly because many tend to be more vulnerable
to cyber attacks than standard computing devices.

Cloud computing services


Adoption of cloud computing platform and infrastructure
services — PaaS and IaaS — continues growing among
organizations globally. Infosec teams must protect these
workloads moving from on-premises systems to public
clouds. Cloud platform providers operate on a “shared
responsibility” model: They protect their cloud platform,
while customers are responsible for securing their data
and software. Thus, customers must do security and
6
White paper | Qualys Cloud Platform

How can you monitor and protect


this far-reaching environment?

To defend modern IT environments, you need an


integrated, centralized cloud-based platform that gives you
a single view of all your IT assets and their vulnerabilities “We use Qualys as
and mis-configurations. You must be able to slice and dice a way to paint a
the data, visualize it with graphs and reports, and analyze picture of security
and share it with multiple stakeholders.
and feed it to our
You could attempt to build a system that gives you this executives. The
holistic and comprehensive view of your threat landscape reports give senior
by cobbling together point products. But it will be
complicated, costly and ineffective. Fortunately, such
executives a concise,
a solution already exists: the Qualys Cloud Platform. real-time view into
eBay’s security risks
and measure change
in those risks as we
implement security
measures.”
Senior Manager,
Information Security

7
Part II

Qualys Cloud Platform


How can we do what others can’t? It’s all in our
cloud-based platform. It continuously collects,
assesses and correlates security, IT and compliance
data of all assets everywhere — in clouds, on
premises, and at mobile/remote endpoints. Qualys
Cloud Platform is the complete, end-to-end security
solution that gives customers a real-time, holistic
view of their threat landscape for comprehensive
attack prevention and immediate incident response.
White paper | Qualys Cloud Platform

Introduction

Overview of the Qualys Cloud Platform

The Qualys Cloud Platform has been architected with Qualys Cloud Platform’s state-of-the-art, massively
the goal of simplifying security by eliminating friction scalable back-end has robust, centralized capabilities for
and making it as intuitive and automated as possible. reporting, storage, data analysis, search indexing and asset
tagging, among other functionality. A centralized, web-
It’s what Qualys calls “Transparent Orchestration (™)”, based, single-pane-of-glass UI gives you a complete and
a principle that represents the future of security, and continuously updated view of your IT environment and its
serves as a key guiding principle and goal for Qualys. security and compliance posture.

Transparent Orchestration is reflected by the Qualys Qualys also offers a private platform that delivers all
Cloud Platform’s design, in particular its three main the benefits of the Qualys Cloud Platform within the
pillars: its versatile sensors; massively scalable backend; walls of your data center. The Qualys Private Cloud
and integrated suite of cloud apps. Platform allows organizations to store scan data locally
under their control for compliance with internal policies
With its always-on sensors, the Qualys Cloud Platform or external regulations.
gives organizations continuous, real-time visibility of
all their IT assets – on-premises, at endpoints or in clouds With this cloud architecture, the Qualys Cloud Platform
– for comprehensive prevention, detection and response. is uniquely designed for protecting today’s hybrid IT
Centrally managed and self-updating, the Qualys sensors environments, including the DevOps pipelines where
come as physical or virtual appliances, or lightweight digital transformation projects are built and deployed.
agents.

Meanwhile, Qualys Cloud Apps provide the tools and 1+ trillion


capabilities for all your security teams, including those
security events
in charge of:

• On-premises infrastructure
• Cloud workloads
3+ billion
IP scans/audits a year
• Endpoint devices
• DevSecOps environments
• Web apps 28+ billion
• IT audit and compliance data points indexed on elastic
search clusters
By consolidating your security stack on the centrally
managed and self-updating Qualys Cloud Apps, you
can keep your teams in sync. You also eliminate the
plethora of siloed, heterogeneous point products that 99.999%
don’t interoperate well, and are difficult to integrate and six sigma scanning accuracy
expensive to manage.

9
White paper | Qualys Cloud Platform

The Ideal Architecture for Securing


Digital Transformation Initiatives

Qualys, a pioneer of cloud-based security and compliance “Capabilities native to these new
since its founding in 1999, is uniquely positioned to
approaches must therefore become
help organizations protect their fast-paced digital
transformation deployments without slowing them down.
a hallmark of an emerging generation
of security technologies. Qualys’ SaaS
To build security into digital transformation efforts, platform is not the only asset it brings
organizations must embed infosec processes and tools into to the opportunity; its own experience
the DevOps software development and delivery pipeline.
The reason: The mobile and web apps, and web services
in developing for the cloud informs it as
generated by DevOps teams are the vehicles for new digital to what organizations need from their
transformation initiatives. forward-looking security tools.”

Qualys can help your organization facilitate the Since digital transformation is so closely tied to
availability and use of automated security tools for enterprises’ use of public cloud services, it’s important to
developers and operations staff, so that code can be highlight how Qualys helps organizations protect their
scanned for vulnerabilities, misconfigurations and other IaaS and PaaS deployments.
security issues early and often in the software lifecycle.
As organizations increase their use of public cloud
Embedding security into DevOps – making it DevSecOps platforms, they encounter security and compliance threats,
– will make code cleaner, and the resulting systems more and cloud-specific challenges, such as:
secure. This approach will foster confidence in security
• Lack of visibility into their cloud assets, usage and
among IT and developer teams, and will help organizations
resources
securely accelerate their digital transformation journeys.
• A misunderstanding of cloud providers’ shared security
In a recent report, 451 Research Senior Analyst Scott responsibility model

Crawford noted that “Qualys’


farsighted cloud
strategy has given it a leg up in serving the This means that organizations must maintain a
continuously updated inventory of cloud workloads, and
hybrid enterprise. The company has long
perform essential security and compliance checks on
provided coverage for what may today be them.
considered ‘legacy’ IT – but its cloud roots
inform its strategy for tackling the IT of Qualys provides native integrations and comprehensive
security and compliance solutions for public cloud
tomorrow.”
platforms, including AWS, Azure and Google Cloud, to help
you:
As businesses seek to become more agile, innovative and
effective through digital transformation, legacy security • Identify, classify, and monitor all cloud workloads and
approaches could become a drag on the automation, resources for vulnerabilities
integration and speed that these new techniques depend
• Comply with internal and external policies
on, according to Crawford.
• Prioritize vulnerability remediation

10
White paper | Qualys Cloud Platform

• Automatically find and eradicate malware infections on


your websites
• Integrate and automate security and compliance
throughout your DevOps pipelines

The Qualys Cloud Platform gives organizations the five


key pillars of digital transformation security:

• Visibility
It compiles a complete, continuously updated IT asset
inventory, and detects changes instantly — on premises,
in clouds and at remote endpoints.

• Accuracy
It centrally collects, stores and analyzes all security and
compliance data, eliminating the incomplete information
from siloed, fragmented point solutions.

• Scale
Its massively scalable cloud architecture protects the
largest global, hybrid IT environments.

• Immediacy
Its robust back-end engines deliver instant prevention
capabilities and incident response.

• Transparent Orchestration (™)


It provisions seamless, dynamic and automated security
across the IT environment, making it friction-less and
intuitive for developers and IT staff.

11
White paper | Qualys Cloud Platform

How it operates

The Qualys Cloud Platform is built upon a robust, modular,


scalable and flexible infrastructure that leverages
virtualization and cloud technologies, and lets us allocate
capacity on demand.

Let’s zoom in and see the Qualys Cloud Platform in action.

Discover Detect Prevent Respond

AI SYN CI CRI VM TP IOC CM

CRA PC PCI FIM SCA CSA WAS

Integrated Suite of Applications

Analysis and API


Reporting Engines
Micro Services

Hardware Virtual Cloud


Distributed Sensors

Agent Passive API

Environments On-premises | Endpoints | Mobile | Containers / Cloud

12
White paper | Qualys Cloud Platform

Versatile Set of Sensors

The Qualys Cloud Platform’s sensors – available as physical and virtual


appliances, and as lightweight agents – are always on, remotely deployable,
centrally managed and self-updating. They enable true distributed scanning
and monitoring of all areas of today’s hybrid IT environments, including:

• From the Internet


• Within the DMZ
• On the internal network
• On networks hosted by public cloud providers

Qualys sensors collect data from your IT environment and automatically beam
it up to the Qualys Cloud Platform, which continuously analyzes and correlates
the information to help you quickly and precisely identify and eliminate threats.

Cloud Agents Virtual Scanners Scanner Appliances Internet Scanners

Works everywhere. Software-only internal On-premises hardware Fast and efficient


The secret to our scanning, on premises scanners for internal external scanning,
continuous visibility or in the cloud networks on premises or in
the cloud

Passive Scanners Out-of-Band Sensors Cloud Connectors APIs

Real-time network Secure highly locked- Collect data from 3rd Collect data from 3rd
analysis of your data down devices or on party cloud platforms parties such as threat
air-gapped networks and software intelligence feeds

13
White paper | Qualys Cloud Platform

Qualys Appliances

Qualys offers various types of scanner appliances:

• Physical appliances that scan IT assets located on your


premises
• Virtual appliances that remotely scan your private cloud
and virtualized environments
• Internet appliances for fast and efficient external
scanning
• Cloud appliances that remotely scan your infrastructure-
as-a-service (IaaS) and platform-as-a-service (PaaS)
instances in commercial public cloud platforms

Appliances are configured through an easy to use interface,


and activated online through the Qualys web interface.

14
White paper | Qualys Cloud Platform

Passive Network Sensor

Passive Network Sensor (PNS) provides continuous and Identify suspicious traffic: PNS provides deep packet
unobtrusive detection of all network-connected systems inspection to continuously analyze and detect suspicious
and their activity in real time. traffic. The Qualys Cloud Platform then correlates these
network anomalies to other indications of compromise.
With PNS, customers can:
Secure and control network access: PNS lets you respond
Eliminate blind spots: The Qualys Cloud Platform
to threats automatically by controlling access to critical
aggregates asset telemetry from PNS, Qualys scanners
resources. Network access control, informed by PNS real-
and Qualys Cloud Agents to provide a comprehensive,
time detection, autonomously protects the network by
detailed and multidimensional inventory of all IT assets
quarantining noncompliant devices based on established
across hybrid infrastructures. This includes unmanaged
policies and security posture.
devices such as employee-owned smartphones and rogue
devices. PNS also discovers and profiles assets that can’t
(Qualys PNS is scheduled for general availability in 2019.)
be actively scanned nor monitored with cloud agents, such
as industrial equipment, IoT systems and medical devices.

Qualys PNS delivers instant visibility into every asset


communicating on your network.
15
White paper | Qualys Cloud Platform

Qualys Cloud Agent

The Qualys Cloud Agent extends security throughout


your global enterprise. These lightweight agents (2MB)
are remotely deployable, centrally managed, self-updating
and consume minimal CPU resources.

Cloud Agents work where it’s not possible or practical to


Most versatile,
do network scanning. They’re our preferred method for complete set of
assets like dynamic IP client machines, remote/roaming sensors
users, static and ephemeral cloud instances, and systems
sensitive to external scanning. Having all these sensor options
— agentless, agent-based and
After their initial deployment, Cloud Agents run a full passive — lets organizations use
configuration assessment of their host in the background any combination of methods,
and upload the collected data to the Qualys Cloud tools and technologies that
Platform for analysis. Then, as soon as changes occur, make the most sense for their
Cloud Agents push updates to the platform, ensuring you
particular infrastructure and
have the latest IT asset data at your fingertips immediately.
needs.

Its many benefits for securing hybrid environments


include:

• No scan windows needed. It’s always collecting data on


assets it’s installed on, even when assets are offline.
• Its constant monitoring yields faster vulnerability
discovery and patch confirmation.
• No need for complex credential and firewall
management. It only communicates outbound to the
Qualys platform.
• It works with multiple Qualys apps, which lets security
teams remove point-solution agents from assets and
consolidate security tools.

Using the Cloud Agent and the multiple Qualys apps that
leverage it, organizations can get a multi-dimensional view
of a breached asset.

16
White paper | Qualys Cloud Platform

Qualys Cloud Apps

Qualys has built a comprehensive suite of security and • Cloud infrastructure


compliance Cloud Apps that stands currently at 18 apps Qualys helps ensure that the organization’s VMs, cloud
and continues to grow. instances and containers are secure and compliant on
public cloud platforms. Qualys has agreements and
The Cloud Apps are self-updating, centrally managed and integrations with major cloud providers, so you can do
tightly integrated, and cover a broad swath of functionality asset inventory, vulnerability management, web app
in areas such as IT asset management, IT security, web scanning, threat prioritization and policy compliance on
app security and compliance monitoring. workloads.

All applications are based on the same platform, share • IT audit and compliance
a common UI, feed off of the same scanners and
agents, access the same collected data, and leverage the Qualys automates compliance and risk management
same user permissions. This lowers the complexity of tasks so your company stays on the right side of internal
usage while maintaining a high level of access control policies and external regulations through asset inventory,
throughout the organization. vulnerability management, configuration assessments, PCI
compliance and vendor risk management.
A centralized, web-based, single-pane-of-glass dashboard
provides a complete and continuously updated view of • Endpoints
your IT environment. This interactive, dynamic dashboard Qualys continuously discovers and monitors the growing
also allows you to aggregate and correlate all of your IT, and increasingly complex universe of networked
security and compliance data in one place, drill down endpoints via comprehensive asset inventory, vulnerability
into details, and generate reports customized for different management, configuration assessments, threat
audiences. prioritization and indication of compromise.

Often, InfoSec teams use an array of heterogeneous, point • DevSecOps and web apps
tools that don’t interoperate well and are difficult and
You can use Qualys to automate testing for vulnerabilities
costly to maintain and integrate, making it difficult for
and misconfigurations in your code throughout your
CISOs to get a single, unified view of the organization’s
web app development and deployment pipeline via
security and compliance posture.
vulnerability management, configuration assessment,
threat prioritization, web app scanning, file integrity
By consolidating their security stacks with the Qualys
monitoring and indication of compromise.
Cloud Apps, organizations escape this tool-fragmentation
nightmare, tear down organizational silos and keep
security teams in sync, including those in charge of
protecting:

• On premises infrastructure
Qualys helps secure the organization’s networks and
data centers with vulnerability management, continuous
monitoring, configuration assessment, threat prioritization,
file integrity monitoring and indication of compromise.
17
White paper | Qualys Cloud Platform

Integrated Cloud Apps


Your organization can use the Cloud Apps it needs, when it needs them,
subscribing to one or more of them, and expand your use over time.

Many customers are using multiple Cloud Apps to develop a more complete
understanding of their environment’s security and compliance posture. The
Qualys Cloud Platform currently provides the following Cloud Apps:

18
White paper | Qualys Cloud Platform

Asset Management IT Security


Qualys Asset Inventory (AI) Vulnerability Management (VM)
AI Qualys AI gives you a complete, continuously VM Qualys VM is an industry leading and award-
updated inventory of all your IT assets winning solution that automates network
everywhere: on premises, in clouds or at mobile auditing and vulnerability management across
endpoints. It lists assets’ installed software, an organization, including network discovery
existing vulnerabilities and hardware details. and mapping, asset management, vulnerability
A powerful search engine lets you do ad hoc reporting and remediation tracking. Driven by
queries and refine them using different criteria. our comprehensive KnowledgeBase of known
vulnerabilities, Qualys VM enables cost-effective
CMDB Sync (SYN) protection against vulnerabilities without
SYN This certified application synchronizes Qualys substantial resource deployment.
AI data with ServiceNow’s Configuration
Management system. Device changes are Qualys Threat Protection (TP)
immediately transmitted to the Qualys Cloud TP With Qualys TP, you can pinpoint your most
Platform and then synchronized with ServiceNow, critical threats and identify what you need to
ending unidentified and misclassified assets, and remediate first. Qualys TP continuously correlates
data update delays. external threat information against your
vulnerabilities and IT asset inventory, so you’ll
Cloud Inventory (CI) always know which threats pose the greatest risk
CI Qualys CI gives you a comprehensive inventory to your organization at any given time.
of your public cloud workloads and infrastructure.
It continuously discovers resources in your public Qualys Continuous Monitoring (CM)
cloud deployments and gives you a “single-pane- CM Built on top of Qualys VM, Qualys CM watches
of-glass” view across all of them from a central your network for threats and unexpected changes,
control panel. before they turn into breaches. Whenever it spots
an anomaly in your network, it immediately sends
Certificate Inventory (CRI) targeted alerts to exactly the right people for each
CRI Qualys CRI assembles and continuously updates situation and each machine. With it, you can track
an inventory of your TLS/SSL digital certificates what happens throughout your public perimeter,
on a global scale by continuously detecting and internal network, and cloud environments.
cataloging every certificate from any Certificate
Authority. It also stops expired and expiring Indication of Compromise (IOC)
certificates from interrupting critical business IOC Qualys IOC delivers threat hunting, detects
functions, and offers direct visibility of expired suspicious activity, and confirms the presence
and expiring certificates right from the dashboard. of known and unknown malware for devices
both on and off the network. From its single
console, you can monitor current and historical
system activity for all on-premises servers, user
endpoints, and cloud instances.

19
White paper | Qualys Cloud Platform

Container Security (CS) policies and external regulations. With PC, you
CS Qualys CS continuously discovers, tracks and can leverage out-of-the-box library content to
protects containers in DevOps pipelines and fast-track your compliance assessments using
deployments across cloud and on-premises industry-recommended best practices.
environments. It gives you complete visibility
of container hosts by gathering comprehensive PCI Compliance (PCI)
topographic information about your container PCI Qualys PCI streamlines and automates
projects — images, image registries, and compliance with PCI DSS requirements for
containers spun from the images. Qualys also protecting the collection, storage, processing
CS lets you scan, protect and secure running and transmission of cardholder data. Qualys
containers. PCI scans all Internet-facing networks and
systems with Six Sigma (99.9996%) accuracy,
Certificate Assessment (CRA) generates reports and provides detailed patching
CRA Qualys CRA lets you assess your digital certificates instructions. An auto-submission feature
and TLS configurations by providing continuous completes the compliance process.
monitoring, dynamic dashboarding and custom
reporting of certificate issues and vulnerabilities. File Integrity Monitoring (FIM)
Qualys Certificate Assessment generates FIM Qualys FIM logs and centrally tracks file change
certificate instance grades using a straightforward events on common enterprise operating systems.
methodology that allows administrators to assess Qualys FIM collects the critical details needed
often overlooked server SSL/TLS configurations to quickly identify changes and root out activity
without having to become SSL experts. It also that violates policy or is potentially malicious.
identifies out-of-policy certificates with weak Qualys FIM helps you comply with change control
signatures or key length. policy enforcement and change monitoring
requirements.
Cloud Security Assessment (CSA)
CSA Qualys CSA automates continuous monitoring Security Configuration Assessment (SCA)
of your public cloud infrastructure, detects SCA A Qualys VM add-on, Qualys SCA expands your
misconfigurations, malicious behavior and non- VM program with automatic assessment of IT
standard deployments, and provides remediation assets’ configurations using the latest Center for
steps. Qualys CSA supports REST APIs for Internet Security (CIS) Benchmarks for operating
seamless integration with the CI/CD tool chain, systems, databases, applications and network
providing DevSecOps teams with an up-to-date devices. SCA users can automatically create
assessment of potential risks and exposure. downloadable reports and view dashboards.

Compliance Monitoring Security Assessment Questionnaire (SAQ)


SAQ Qualys SAQ automates and streamlines third-
Policy Compliance (PC)
PC party and internal risk assessment processes, so
Qualys PC performs automated security
you don’t have to do them manually. With SAQ,
configuration assessments on IT systems
you easily design surveys to assess respondents’
throughout your network, helping you reduce
procedural controls of IT security policies and
risk and continuously comply with internal
20
White paper | Qualys Cloud Platform

practices. SAQ automates the launch insert security into DevOps environments. Qualys
and monitoring of assessment campaigns, and WAS also identifies and removes malware from
provides tools for displaying and analyzing websites using behavioral and static analysis.
the data.
Web Application Firewall (WAF)
Web Application Security WAF Simple, scalable and adaptive, Qualys WAF blocks
attacks, and lets you control when and where your
Web Application Scanning (WAS)
applications are accessed. Qualys WAF and Qualys
WAS Qualys WAS continuously discovers and
WAS work together seamlessly. You scan web apps
catalogs web apps in your network and detects
with Qualys WAS, deploy one-click virtual patches
vulnerabilities and misconfigurations. Its
for detected vulnerabilities in WAF, and manage it
integration with Qualys WAF provides one-click
all from a centralized cloud-based portal. It can be
patching of web apps. With WAS, you can also
deployed in minutes.

Customizable, user-defined dynamic dashboard for real-time tracking progress of


WannaCry remediation alerts
21
White paper | Qualys Cloud Platform

BACK-END DATA CATEGORIZATION,

VISUALIZATION AND ANALYSIS

The platform’s asset tagging and management capabilities let customers


identify, categorize and manage large numbers of IT assets and automates
the process of inventorying and organizing them hierarchically. Meanwhile,
a highly configurable reporting engine powers the creation of reports, graphs
and dashboards so that customers can generate visual representations of
the data. Our analytics engine indexes petabytes of security and compliance
data gathered from our customers’ IT environments, makes this information
searchable and correlates it against external threat data contained in the
Qualys KnowledgeBase.

Scanner
Service
VM PC WAS WAS FIM

Passive
Sensor Qualys Streaming Data Backbone
Service

Cloud Reporting Analytics IOC Indexing Asset


Service Tagging
Agent
Service
Service

22
White paper | Qualys Cloud Platform

The data analysis is done from a variety of angles and


perspectives. For example, if the Qualys Cloud Platform
detects that a registry key was changed or added in
a Windows laptop, the data is beamed up to the back-end
engine, where it’s analyzed in a multi-dimensional way.
In this case, the Qualys Cloud Platform will explore
possible reasons for the registry alteration, investigating
whether a policy compliance violation is behind it or
whether it points to a malware infection. In short, Qualys
Cloud Platform takes this one data point and analyzes
it multiple times, a task that otherwise the organization
could only perform by purchasing several point solutions
from other vendors.

Our integrated workflow service lets customers quickly


make risk assessments and access information for
remediation, incident analysis and forensic investigations.
Customers can generate help desk tickets, manage policy
and compliance exceptions, and track and escalate
patching and risk mitigation efforts. The Qualys Cloud
Platform can also trigger notifications to proactively alert
customers about a variety of actions and incidents, such
as the detection of new vulnerabilities and malware
infections, completion of scans, opening of trouble tickets
and system updates.

23
White paper | Qualys Cloud Platform

Advantages of our cloud-based


architecture

• A Single, Comprehensive View • Seamless, flexible scaling


Central analysis of data from many different sensor Qualys Cloud Platform is a scalable, end-to-end
types is only possible in the cloud. Our easy-to-deploy solution for all aspects of IT security. Once deployed,
appliances and lightweight agents automatically beam add new coverage, users and services as you need
up to the Qualys Cloud Platform the security and them. Subscription packages are tailored for organizations
compliance data they’re constantly gathering from of all sizes. Customers can also purchase app subscriptions
customers’ IT environments. a la carte.

• Best-of-Breed Applications • Up-to-date resources


Our cloud architecture allows us to provide a complete Qualys has the largest knowledge base of vulnerability
set of integrated, best-of-breed applications, correlate signatures in the industry, and performs over 3 billion IP
disparate data from on-premises systems, endpoints and scans per year. All security updates are made in real time.
cloud instances, and easily add new services.
• Securely stored data
• Easy and intuitive Vulnerability data is securely stored and processed on
There’s nothing to install or manage, and all services are an n-tiered architecture of load-balanced servers. Our
accessible on the cloud via web interface. Qualys operates encrypted databases are physically and logically secure.
and maintains everything. The platform is always on and
self-updating.

• Lower operating costs


With everything in the cloud, there are no capital
expenditures, no extra human resources needed, and
no infrastructure or software to buy and maintain.
Qualys also gives you more control over licensing costs
via its flexible, subscription-based model.

• Easy global scanning


Easily perform scans on geographically distributed and
segmented networks both at the perimeter, behind the
firewall, on dynamic cloud environments and endpoints.

24
White paper | Qualys Cloud Platform

Our apps and services are delivered


either via our public cloud platform, or
private cloud platform
Public Cloud Platform Option
Our public cloud platform, which is multi-tenant, multi- Stored data is kept encrypted. Qualys encrypts each user’s
layer, and highly-scalable, is offered from data centers data uniquely, so that only the user who created the data
in Santa Clara, California; Ashburn, Virginia; Geneva, can access it. Qualys has no insight into customer data.
Switzerland; Pune, India; and Amsterdam, the Netherlands. Qualys does not have access to the encryption key, so
Qualys can’t decrypt stored data.
Qualys’ public cloud platform can be accessed around
the clock from anywhere through a Web browser, and The Qualys Cloud Platform resides behind network-
consistently maintains 99% availability. It’s updated based, redundant, highly-available firewalls and intrusion
transparently, without interruption to users, and is only monitoring solutions. In addition, each host runs a
briefly taken offline once a quarter for maintenance. localized firewall on top of the customized, hardened
Linux distribution, which is unique to Qualys.

The platform is hosted in data centers subject to at least


an annual SSAE 16 or industry standard alternative
audit by an internationally-recognized accounting
firm. All Qualys devices are located in physically secure,
dedicated, locked cabinets protected by multiple-factor
authentication, including biometrics.

Core services include:

• Asset Tagging and Management


• Reporting and Dashboards
• Questionnaires and Collaboration
• Remediation and Workflow
• Big Data Correlation and Analytics Engine
• Alerts and Notifications

25
White paper | Qualys Cloud Platform

Private Cloud Platform Option


For organizations that need to keep their security and
compliance data under their control, we offer the Qualys
Private Cloud Platform, which has all the features of our
multi-tenant public cloud platform. The Qualys Private
Cloud Platform is ideal for businesses located in countries
with strict data sovereignty rules, government agencies
with data possession requirements, and MSSPs that want
to provide more exclusive offerings.

Available as a full server or virtual rack for large


organizations, and as a standalone appliance for smaller
businesses, the all-in-one devices are pre-loaded with
the Qualys software and pre-configured for quick and
easy deployments. All physical rack and cabling work is
completed before the appliance arrives. They’re remotely
updated and maintained by Qualys, which even handles
any necessary hardware expansion.

26
White paper | Qualys Cloud Platform

Qualys Subscriptions

SMB, mid-size, enterprise, consultant


and MSPs, government

Qualys caters to organizations of all types and sizes with Qualys for Mid-Size Organizations
various subscription options. Offerings can be tailored
For mid-size businesses, Qualys can help
and expanded to fit customer needs, with pricing based on
simplify their IT security and lower their cost
selected Qualys Cloud Platform features, apps, scanners
of compliance. The Qualys Express cloud suite
and agents, and on the range of monitored IT assets.
includes capabilities for IT asset inventorying,
vulnerability management, continuous network
We offer subscriptions for enterprises, mid-size
monitoring, web application scanning and firewall,
organizations, small businesses and government agencies.
threat prioritization, policy compliance including
We also have a subscription for consultants and MSPs that
PCI, and vendor risk management.
use Qualys to provide security and compliance services to
their clients.
• 5,120 IPs for scans
All subscriptions include free training and support. • 200 web apps for scans
Customers can also scan their devices and web apps an • 5 scanners
unlimited number of times, and use an unlimited number
of Cloud Agents. • Unlimited users
• Remediation ticketing & tracking
Let’s look at each offering individually.
• Integration with public clouds

Qualys for Small Businesses Qualys for Enterprises


IT security is often a weak link at small Qualys offers large organizations a complete
businesses, because they lack in-house security and compliance solution, so they slash
resources and knowledge in this area. With the their TCO by eliminating traditional, standalone
Qualys Express Lite cloud suite of security and products that have limited functionality and
compliance solutions, small businesses can operate in silos.
monitor security and compliance right from
a browser. Its capabilities include continuous • Unlimited IPs for scans
network monitoring, vulnerability management,
• Unlimited web apps for scans
threat prioritization, PCI compliance, vendor risk
management, and web application scanning. • Unlimited scanners
• Unlimited users
• 256 IPs for scans
• Remediation ticketing & tracking
• 25 web apps for scans
• Integration with public clouds
• 2 scanners
• 3 users

27
White paper | Qualys Cloud Platform

Qualys for Consultants and MSPs • Actionable Reporting: Create client-focused


reports that show vulnerability trending and
The challenges, demands and pressures faced
that can be exported in a variety of formats
by security consultants are intensifying, as their
(HTML, DocX, MHT, XML, PDF, CSV). You can
customers’ IT infrastructures become more
add your logo and personalize reports with your
complex and hackers get more bold and effective.
organization’s branding.

To succeed, consultants can’t just rely on their


know-how and experience: They must also arm Qualys for Government
themselves with the best software tools available As the government embraces digital
to do their jobs. transformation, cloud adoption is at the forefront.
Securing digital efforts by identifying, detecting,
With its cloud-based, centrally managed and responding to cyber threats while meeting
Consulting Edition offering, Qualys stands apart regulatory and compliance requirements is critical
in this market full of manual tools with limited to this transformation. To be successful, local,
functionality. state and federal agencies and the DoD require
an integrated security and compliance platform,
Consulting Edition helps consultants and MSPs ensuring complete and continuous control of their
offer their customers a wide range of first-class evolving IT environments.
security and compliance assessment services.
The FedRAMP-authorized Qualys Gov Platform
• Multi-tenancy: Easily organize and manage provides a unified solution that agencies can
data from your multiple clients from a central deploy with ease and at scale, offering visibility
dashboard. As you conduct scans, results are of their IT assets’ security and compliance status.
directly associated with the appropriate client The Qualys Gov Platform overcomes limitations
records. You can segment clients’ unique network of legacy enterprise security products designed
environments. for homogeneous, encapsulated environments.
• Flexibility and Comprehensiveness: Offer a Instead, the Qualys Gov platform offers the
broad range of services, including vulnerability scale, agility and versatility desired by advanced
management, policy compliance, and web cyber defense practitioners that must protect
app scanning -- on premises, in clouds and at today’s hybrid, borderless and fast-changing IT
endpoints. This is made possible by Qualys’ environments.
versatile sensors, including local, virtual and
cloud scanners; Cloud Agents; and passive
network sniffer. All processes can be automated
using Qualys’ APIs.

28
White paper | Qualys Cloud Platform

Qualys Gov Platform highlights:

• FedRAMP Authorized and CDM Approved: Qualys Gov


Platform obtained FedRAMP Authorization to Operate
(ATO) in 2016, and is on the Approved Products List of the
General Services Administration’s CDM program.
• Deployment Flexibility: For agencies with strict data
storage requirements, Qualys’ Private Cloud Platform
(PCP) option provides all Qualys Gov Platform benefits
within your datacenter, letting you store data under your
control.
• Custom Templates for Federal Agencies: Qualys Cloud
Apps offer multiple out-of-the-box templates, capabilities
and pre-built content designed to streamline compliance
with federally mandated regulations and policies.
• End-to-End Security Platform: Fully mapped to the NIST
Cybersecurity Framework, Qualys Gov Platform helps
your organization from identification and detection, to
protection and response.

29
White paper | Qualys Cloud Platform

Qualys Community Edition

To help small organizations tackle today’s security CertView lets organizations take back control of their
and compliance challenges, Qualys offers the Qualys Internet-facing certificates by inventorying and assessing
Community Edition, a free version of its platform. With them. It gives you visibility into all of your Internet-facing
Qualys Community Edition, small businesses can leverage certificates and SSL/TLS configurations, and lets you
the accuracy and reliability of Qualys Cloud Platform to centrally control and visualize prioritization of certificate
discover IT assets and vulnerabilities, identify compliance and configuration remediation. Customizable dashboards
gaps and get detailed reports. with highly configurable widgets help you see your
certificate status, grade information and vulnerability data.
Using Qualys agents and scanners, this community
edition provides asset discovery, vulnerability assessment, CloudView and CertView are also available as stand-alone
configuration assessment, web app scanning, and free apps outside of the Community Edition offering.
inventory of public cloud workloads.

Via the platform’s interactive, customizable and dynamic


dashboard, Qualys Community Edition gives small
organizations a unified, streamlined view of the assets and
web apps being monitored.

There’s nothing for them to install, maintain or manage:


All services are in the cloud, accessible via a web interface.
Qualys Community Edition scans their IT infrastructure
as well as web applications against the complete Qualys
Knowledgebase of vulnerabilities.

Qualys Community Edition comes with Qualys CloudView


and Qualys CertView.

CloudView lets organizations see all their public cloud


assets and resources from a central, “single pane of view”
interface. It continuously discovers and tracks assets and
resources such as instances and virtual machines, storage
buckets, databases, security groups, ACLs, ELBs, and users,
across all regions, multiple accounts and multiple cloud
platforms.

qualys.com/communityedition
30
White paper | Qualys Cloud Platform

COMPREHENSIVE TRAINING

AND SUPPORT

Qualys is deeply aware of the importance of partnering


with and supporting its customers every step of the way.

Qualys provides free product training and 24 x 7 telephone


support. Calls are answered within one minute and involve
a collaborative approach with support, operations and
engineering staff. Support emails are answered in under
24 hours on average. We have customer support centers
in our Foster City, California headquarters; Raleigh, North
Carolina; Reading, United Kingdom; and Pune, India.

In addition, the Qualys website has a support community


with more than 20,000 members, training videos and
a knowledge base. There, Qualys employees and customers
meet to share best practices and answer each other’s
questions.

31
White paper | Qualys Cloud Platform

Part III

Customers

32
White paper | Qualys Cloud Platform

Customer Base

The best testament to the quality of our products is our customer base.
Qualys has more than 10,300 customers from all major vertical industries in
over 130 countries. We have a majority of the Forbes Global 100 and Fortune
100 as customers.

9 of the top 10 in Software

8 of the top 10 in Consumer Discretionary

8 of the top 10 in Consumer Staples

8 of the top 10 in Major Banks

8 of the top 10 in Technology

8 of the top 10 in Telecommunications

7 of the top 10 in Healthcare

6 of the top 10 in Industrial & Materials

5 of the top 10 in Insurance

Qualys also has established strategic partnerships with leading managed


service providers and consulting organizations including Accenture, AT&T, HPE,
BT, Deutsche Telekom, HCL Technologies, IBM, Infosys, NTT, Verizon and Wipro.

33
White paper | Qualys Cloud Platform

Geisinger Finds Cure in


Continuous Security Monitoring

Geisinger Health System uses Qualys Cloud Platform's, Geisinger, which has 30,000 employees, piloted Cloud
Vulnerability Management, PCI, Web Application Scanning Agent on the servers of its security team department. “It
and Cloud Agent to help protect its IT environment, which passed. There were no discrepancies between the agent
contains a mix of on-premises and cloud systems. The and the Qualys Cloud Platform VM vulnerability scans,”
Danville, Pennsylvania healthcare services provider has Cooper says. “Now we can have the agent added to our
several data centers, over 20,000 endpoints and thousands base server image so that any new server that’s built from
of servers. our virtual template instantly has the agent installed. That
means, new servers immediately report themselves to the
Geisinger has been a Qualys customer for about Qualys Cloud Platform.”
8 years, during which time it has deepened its use of
Qualys products. “Right out of the gate we know that a new system is
provisioned and in our vulnerability management life
“We started with traditional vulnerability management, cycle,” Cooper says. “That’s precisely how the Qualys
but we’ve expanded our use as our organization has grown Cloud Agent, powered by the Qualys Cloud Platform, helps
along with the complexity of the devices, applications Geisinger improve its vulnerability management efforts
and infrastructure, especially on equipment that directly and achieve the real-time, continuous security both the
impacts patient care,” says Nathan Cooper, information security team and Geisinger needed.”
security analyst in cyber operations at Geisinger.

34
White paper | Qualys Cloud Platform

Cloud Agent Boosts Vulnerability


Detection at Synovus

The Qualys Cloud Agent is making a difference at Synovus precision. It soon found out that, contrary to its previous
Bank, a financial services company based in Columbus, estimates, its average laptop didn’t have 30 vulnerabilities
Georgia with about $28 billion in assets. but rather about 200 vulnerabilities.

Synovus started using Qualys VM to perform frequent Synovus changed its laptop patching schedule and
vulnerability scans for all internal and external assets; increased it to a daily frequency. The results: its average
receive faster notification and remediation for zero day laptop now has about 10 vulnerabilities, a dramatic drop.
and critical threats; and improve its vulnerability analysis
and security patching programs by providing data that can “Cloud Agent had an immediate impact,” says Corey Reed,
be used to prioritize patch distribution. a senior security analyst at Synovus.

The company then adopted Cloud Agent to sharpen the Synovus likes that the Cloud Agents require minimal
collection of vulnerability information from its laptops. maintenance because they’re self-updating, and that they
Unlike desktop workstations, servers and network can be easily deployed through group policy and SCCM
appliances, laptops are mobile and thus are intermittently (System Center Configuration Manager). Synovus also
connected to its network, so at Synovus they often missed appreciates the negligible impact Cloud Agents have on its
prescheduled vulnerability scan windows. network and IT assets because the agents consume very
little computing resources.
With Cloud Agent, Synovus was able to discover
vulnerabilities in laptops in near real time and with more

35
White paper | Qualys Cloud Platform

Capital One Builds Security


Into DevOps

Capital One has embedded automated security checks Building a secure AMI bakery
into its DevOps pipeline with the help of Qualys,
dramatically accelerating the assessment of vulnerabilities Initially, Capital One’s process for certifying the security
and mis-configurations in its virtual machine images of Amazon Machine Images (AMIs) was manual and slow,
and containers. taking up to two weeks, as the DevOps and security teams
got on a “fix / find / verify” loop.
As a result, the code created in the DevOps pipeline
is certified as secure and released to production To shorten this process, the DevOps team was given
without unnecessary delays. This allows Capital One to API access to the security team’s Qualys vulnerability
consistently boost its business across the board by quickly management and policy compliance tools.
and continuously improving its web properties, mobile
apps, online services and digital offerings. This allowed developers to run scans themselves, get
reports, remediate and re-scan as needed, without
“This has provided a huge benefit to the entire company,” involving the security team. This shortened the process to
said Emmanuel Enaohwo, Capital One’s Senior Manager for under 24 hours.
Vulnerability/Configuration Management.

36
White paper | Qualys Cloud Platform

Capital One also seeds the Qualys Cloud Agent on every


AMI deployed to production, so it’s alerted immediately
about newly-discovered security and compliance issues
on live instances.

With the Cloud Agent on almost every AMI passing


through its DevOps “bakery”, Capital One achieved
95% assessment coverage of its IP addresses.

The agent has boosted accuracy of detection of


vulnerabilities and mis-configurations, slashing false
positives, and quickening scan data availability.

“All these KPIs are met because of the integration with


DevOps using the Qualys Cloud Agent and APIs,” he said.

Securing containers

Capital One uses Docker containers to add speed and


flexibility to its application development and delivery.

To protect these environments, Capital One chose Qualys


Container Security (CS), which provides continuous
discovery and tracking of containers in DevOps pipelines.

Capital One uses Qualys CS’s plug-in for the Jenkins


CI/CD tool, so DevOps teams can scan and fix container
images themselves.

37
White paper | Qualys Cloud Platform

Part IV

The future

38
White paper | Qualys Cloud Platform

A Peek at What's Coming

The Qualys Cloud Platform will continue to grow in scope of our Qualys Cloud Platform, with its cloud oriented,
as we push ahead of competitors. New products that are modular, comprehensive and integrated architecture,
in the works include cloud apps to manage patches and including:
digital certificates.
• Unified suite of best of breed solutions
Also in the pipeline: a mobile security offering that will • Global delivery
include Cloud Agents for iOS, Android & Windows Mobile,
EMM (enterprise mobility management) capabilities, as • Faster, simpler, inexpensive deployment
well as asset inventory, vulnerability management, threat • Higher quality
detection and policy compliance and enforcement.
• Continuous improvements

As we continue to innovate and deliver industry-leading


Qualys: Building security seamlessly into hybrid IT
products, customers will keep reaping the unique benefits
environments to enable the digital transformation.

39
White paper | Qualys Cloud Platform

About Qualys
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 10,300 customers
in more than 130 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline
and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for
greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver
businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection
for IT systems and web applications on premises, on endpoints and elastic clouds. Founded in 1999 as one of the first SaaS security
companies, Qualys has established strategic partnerships with leading managed service providers and consulting organizations

Qualys, Inc. - Headquarters


Qualys is a global company with offices around the world. To find an office near you, visit
http://www.qualys.com

919 E Hillsdale Blvd, 4th Floor Foster City, CA 94404 USA


T: 1 (800) 745 4355,
[email protected]

© Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks are the property of their respective owners. 9/16
40

You might also like