Asset Inventory. Key Features. Maintain full, instant visibility of all your global IT assets.

Similar documents
VULNERABILITY MANAGEMENT BUYER S GUIDE

SysTrack Workspace Analytics

VULNERABILITY MANAGEMENT BUYER S GUIDE

BACSOFT IOT PLATFORM: A COMPLETE SOLUTION FOR ADVANCED IOT AND M2M APPLICATIONS

What Do You Need to Ensure a Successful Transition to IoT?

TOP 6 SECURITY USE CASES

IBM QRadar SIEM. Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights

The Symantec Approach to Software Asset Management

Qualys Compliance Solutions

Configuration Management in cloud environment

Server Configuration Monitor

Building a CMDB You Can Trust in a Complex Environment

_ PRODUCT OVERVIEW EFFECTIVE MARCH 6, 2019 PRODUCT OVERVIEW

IT S TIME TO RETHINK VDI:

Comprehensive Cost and Security Management for C2S Environments

_ PRODUCT OVERVIEW EFFECTIVE AUGUST 6, 2018 PRODUCT OVERVIEW

IBM Planning Analytics Express

ORACLE PROJECT PORTFOLIO MANAGEMENT CLOUD

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Server Configuration Monitor

Wonderware System Platform 2017 Real-time Operations Control Platform for Supervisory, HMI, SCADA and IIoT

SAP BusinessObjects Edge BI, Preferred Business Intelligence. SAP Solutions for Small Business and Midsize Companies

Fulfilling CDM Phase II with Identity Governance and Provisioning

Analytics for All Your Data: Cloud Essentials. Pervasive Insight in the World of Cloud

Automatically Find and Fix Insecure Database settings with Oracle Management Cloud PRO4284

CloudShell Pro. Self-Service Sandbox Environments for Physical, Virtual, and Hybrid-Cloud D ATA SHEET. The Need for Cloud Sandboxing

ShowMe Barcode. The real-time, fully integrated IBM i barcoding solution with professional printing, scanning and wireless transactions

QLYS Investor Day. Philippe Courtot, Chairman and CEO Sumedh Thakar, Chief Product Officer Amer Deeba, Chief Commercial Officer Melissa Fisher, CFO

Modernizing Cyber Defense: Embracing CDM. Okta Inc. 301 Brannan Street, Suite 300 San Francisco, CA

Microsoft moves IT infrastructure management to the cloud with Azure

2 ebook Increase Service Visibility

BUSINESSOBJECTS EDGE PROFESSIONAL

BUSINESS OBJECTS CRYSTAL DECISIONS PROFESSIONAL

GDPR: Centralize Unstructured Data Governance Across On-premises and Cloud

The Hybrid Enterprise: Working Across On-premises, IaaS, PaaS and SaaS

Expert Reference Series of White Papers. Microsoft Service Manager Simplified

VMware vcenter Operations Standard

Cloud Computing in the Industrial Space

AppManager + Operations Center

Automated Service Intelligence (ASI)

Title: Introducing Enterprise Discovery 2.1 Session #: 537 Speakers: Matt Schvimmer, Matthew Darwin Company: HP

The Leading Low-code Application Platform For Modern Work Management

Make the most of the cloud with Microsoft System Center and Azure

REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: WORKSPACE ONE INTELLIGENCE

A Cloud Migration Checklist

CA Network Automation

AWS MSP Partner Program Validation Checklist v3.2 Mapping

Network Access Control (NAC) Market, Global, Forecast to 2022

Securely Enabling the Enterprise of Things

How to Choose a Managed Services Provider

BMC Remedyforce Asset Management. Frequently Asked Questions

Oracle Management Cloud

IBM Service Management for a Dynamic Infrastructure IBM Corporation

IBM Tivoli Endpoint Manager for Software Use Analysis

LogLogic. Open Log Management. LogLogic LX and LogLogic ST for Enterprise. LogLogic LX Enterprise- Class Log Data Capture and Processing

Driving Greater ROI From ITSM with The Future of SAM. Martin Prendergast, CEO Concorde

NetIQ AppManager Plus NetIQ Operations Center

Asset Performance Management from GE Digital. Enabling intelligent asset strategies to optimize performance

Brocade SANnav Management Portal and. Global View. Product Brief. Storage Modernization. Highlights. Brocade Fabric Vision Technology

no. 1 The Big Challenge THE BIG BANG EFFECT OF CENTERITY BSM ON KPN S CLOUD & MANAGED SERVICES

UNDERSTANDING THE NEED FOR A HELP DESK SOLUTION. How to select the right help desk solution for your organization

Savvius and Splunk: Network Insights for Operational Intelligence

Prepare for GDPR today with Microsoft 365

Info-Tech Security Information & Event Management (SIEM) Use Case: Compliance Management

20 Signs That Your Business is Ready for Managed Services. Find out when your business will truly benefit from a technology provider.

Achieve Continuous Compliance via Business Service Management (BSM)

Resolve End User Experience Issues for Any Citrix or VMware-Delivered Application

Your Business Needs Managed Services. Find out when your business will truly benefit from a technology provider.

Buyers Guide to ERP Business Management Software

Embracing the Digital Workplace with Unified Endpoint Management (UEM)

SAP BusinessObjects Business Intelligence

20 Signs That Your Business is Ready for Managed Services. Find out when your business will truly benefit from a technology provider.

20 Signs That Your Business is Ready for Managed Services. Find out when your business will truly benefit from a technology provider.

Resolve End User Experience Issues for Any Citrix or VMware-Delivered Application

BMC - Business Service Management Platform

CLOUD ACCESS CONTROL 6 REASONS WHY IT S A MUST FOR YOUR COMPANY

Qualys Compliance Solutions

VSaaS: 11 reasons Why Video Surveillance is Moving to the Cloud

Unified Monitoring 101. A Guide To Monitoring The Entire IT Infrastructure

A technical discussion of performance and availability December IBM Tivoli Monitoring solutions for performance and availability

Service management solutions White paper. Six steps toward assuring service availability and performance.

Smart Net Total Care. Realizing the Promise of Automation for Network Support Operations

On-premise or Cloud: Which is Right for Your Business

Service Description Cloud Expert Services

Oracle Product Hub Cloud

WennSoft Evolution Your Field Service Solution for the Connected Business

Self-driving ERP TM. Experience the power of people-centric ERP solutions designed for the speed of business. In business for people.

WHITE PAPER. Top Three Use Cases for Automated OT Asset Discovery and Management

Intelligence, Automation, and Control for Enterprise DevOps

Smart Content Governance

Bitnami Stacksmith. What is Stacksmith?

SYSTEM PLATFORM POWERED BY WONDERWARE

AlgoSec Security Management Suite

MANAGEMENT CLOUD. Manage the Modern Cloud with Oracle Management Cloud

See What's Coming in Oracle Fusion Accounting Hub Reporting Cloud Service

VoIP Solution How to Make the Best Choice for Your Business

Asset Management Oversight is Essential to Effective Governance

The Modern IT Experience

RSA ARCHER IT & SECURITY RISK MANAGEMENT

Transcription:

AI Asset Inventory Maintain full, instant visibility of all your global IT assets. Digital transformation has made inventorying IT assets more challenging. Web apps and software-defined infrastructure are deployed continuously and quickly. Virtualization and containerization have made IT assets more ephemeral. IT environments are increasingly hybrid. Qualys Asset Inventory (AI) gives you a single source of truth for IT assets of all types, wherever they are: on-premises, in clouds, at endpoints, and in mobile devices. This clarity gives you unprecedented understanding of your asset landscape, and a better ability to manage and secure it. Built on the world s leading cloud-based security and compliance platform, Qualys frees you from the substantial cost, resource and deployment issues associated with traditional software products. Key Features Continuous discovery and 2-second visibility Asset Inventory constantly gathers information on all assets, listing system and hardware details, active services, open ports, installed software and user accounts. Asset discovery and inventory collection is done through a combination of Qualys network scanners and Cloud Agents, which together can collect comprehensive data from across on-premises or cloud infrastructure as well as remote endpoints. CMDB integration A certified application synchronizes Qualys Asset Inventory data with ServiceNow s Configuration Management system. Device changes are immediately transmitted to the Qualys Cloud Platform and then synchronized with ServiceNow. For customers, this means an end to unidentified and misclassified assets, and to data update delays, all of which increase chances of breaches.

Automatic normalization and classification With Asset Inventory, customers can make their asset data consistent and uniform, which is essential for having inventory clarity and accuracy. The product standardizes every manufacturer name, product name, model and software version by automatically normalizing raw discovery data, using Qualys ever-evolving technology catalog as reference. The catalog is continuously curated with a focus on completeness, relevance, and data quality. This process transforms the global IT asset inventory into multidimensional and structured information, so that you can make better business decisions. Actionable insights with nondiscoverable asset metadata The Qualys technology catalog automatically extends your IT asset inventory with non-discoverable asset metadata, such as hardware and software product release dates, end of life dates, license categories, and more. These attributes provide IT organizations with multiple lenses that broaden asset visibility in new, meaningful ways. Teams can detect a variety of issues, such as unauthorized software, outdated hardware or end-of-life software, which can help you to properly support and secure critical assets. Qualys Asset Inventory is a powerful cloud-based solution for a complete, continuously updated inventory of all IT assets, wherever they reside. Benefits 2-second visibility You can t secure what you don t know is there. Qualys AI gives you full clarity into all assets. Business-contextual inventory It supports tagging of assets for easy labeling and identification, adding business context to your inventory. Multidimensional view of assets Qualys AI enriches asset information with deep component details, like product release dates, and end of life dates. This multidimensional asset view Uniform, accurate information Qualys AI standardizes IT asset data, eliminating confusing and inconsistent variations. lets you make better business decisions. Built for the digital transformation Qualys AI goes beyond traditional assets, inventorying cloud instances, containers, and more, via Qualys versatile agent-based and agent-less discovery methods. Consolidate solutions Qualys AI provides a single source of truth for IT asset data. This improves communications between CIOs and CISOs and enhances collaboration and planning across IT and InfoSec. With Qualys Asset Inventory, we can start to see the answers to questions such as: 'Which PCs, laptops and business areas are at the highest risk of attack?', 'which systems are not being patched in a timely manner?' and 'where can we deploy our resources to see the greatest cyber security benefit? Eddie Dynes Information Security and Compliance Manager at London Gatwick Airport

Access a complete, searchable IT asset inventory You can t protect or defend yourself from what you don t know is in your network, like unapproved devices and unauthorized software. Qualys gives you full horizontal visibility of all hardware and software, scaling up to millions of assets on premises, in cloud instances and mobile endpoints. Continuously collects and feeds system, compliance, and security data from IT assets into the Qualys Cloud Platform s back-end engine for aggregation, indexing, correlation, and analysis. Covers all bases with a variety of data discovery and collection sensors, such as: Physical and virtual appliances that scan IT assets on premises, in private clouds, or in virtualized environments. Cloud appliances that remotely scan your IaaS and PaaS instances in commercial cloud platforms. Lightweight, all-purpose Cloud Agents that continuously monitor assets they re installed on, such as laptops. Has a powerful search engine that lets you craft complex queries combining multiple asset criteria and that returns results instantly, so in two seconds you can find out: How many PCs from a particular manufacturer do we have in our environment? Which of our IT assets are impacted by a specific vulnerability? Rationalize IT assets, prioritize work and gain actionable insights Qualys gives you a multidimensional view of your global IT assets, allowing you to slice-and-dice their attributes and gain new perspectives that can help you make and expedite better business decisions. At the core, a normalization engine automatically standardizes virtually any meaningful IT asset data point. The normalization process is essential for accurate decision making. Manufacturer names, products, models, and software versions are standardized and structured. Acquisitions and product lineage are automatically accounted for. When viewing and analyzing software inventory, it is critical to differentiate applications from system software, since the former need to be managed and analyzed without the extra clutter of the latter. Asset Inventory automatically classifies all software, separating applications from system software, such as OS patches and drivers. Multi-level taxonomy is based on industry standards, careful analysis and curation. Every asset is classified in meaningful, functional categories based on hardware and software. The Qualys technology catalog automatically populates your IT asset inventory with asset metadata that can t be discovered otherwise, such as hardware and software product release dates, end of life dates, license categories, and more. These attributes provide IT organizations with multiple lenses that expand asset visibility in new, meaningful ways. Which servers are running an OS that its vendor recently stopped supporting? Which IT assets have a particular piece of software installed? How many Lenovo laptops running the latest version of Windows 10 and located in my India office have a particular vulnerability? Highlight and rank criticality of assets Not all assets carry the same weight within your organization. Asset Inventory lets you tag your assets, so you put relevant labels on them in the inventory and organize them in multiple ways. For example, you can specify which assets fall within the scope of PCI DSS (Payment Card Industry Data Security Standard) compliance. Supports tagging of assets for easy labeling and identification Gives you the ability to apply tags manually or configure rules and parameters for automatic tagging Supports creating any kind and any amount of hierarchies, and giving assets as many tags as you want Calculates criticality based on asset s aggregated and consolidated system, security, and compliance data, as well as established hierarchies and priorities

Get real-time, continuous inventory updates with Qualys Cloud Agents An IT asset inventory loses its value if its data gets stale. New vulnerabilities are disclosed every day. Old ones can suddenly become more dangerous. A laptop can quickly go from secure to compromised. Qualys complements its physical, virtual and cloud scanners with its revolutionary Cloud Agents, which: Are lightweight and, after the initial comprehensive asset assessment, only report detected changes, so they have a minimal impact on systems and networks Run in the background and update themselves Continuously assess the asset s security and compliance status Can be installed in assets that are on premises, in cloud instances and mobile endpoints Are deployed via a flexible, compact agent installer Visualize with customizable dashboards It s essential to graphically display IT inventory data so that you can act on insights and prevent and address threats. Asset Inventory s interactive, customizable dashboard lets you visualize and share the security, configuration and compliance status of IT assets. Leverages robust search engine to let you turn queries about IT assets into dashboard widgets updated in real time, so you don t have to manually run a frequent query Displays widget data in various ways using graphs, tables and charts Lets you establish thresholds and alerts you when they ve been crossed by, for example, changing a widget s background color from green to red Allow you to create different dashboards and reports tailored for different purposes and users, such as InfoSec pros, compliance/risk managers, and CSOs Integrate with your CMDB IT asset inventory solutions must link up with your CMDB (configuration management database) and continuously feed it fresh, detailed data. That way, the CMDB can better illustrate and map the relationships, connections, hierarchies and dependencies among IT assets. The Qualys App for ServiceNow CMDB syncs information about assets Qualys discovers into ServiceNow. Allows IT departments to be more effective at a variety of critical tasks, such as change management, service requests, incident response, system repair and impact analysis. Eliminates the need for IT staffers to update manually update the CMDB with granular system, security and compliance data on new and changed assets across an IT environment Supports multiple Qualys accounts/api sources Allows synchronization schedules to be configured and saved As required by ServiceNow, stages changes to ServiceNow CMDB for user approval before being written to CMDB Features preconfigured table transform maps for open ports, assets, network interfaces, software, processors and volumes, as well as preconfigured reports

Qualys Cloud Platform the revolutionary architecture that powers Qualys IT security and compliance cloud apps Sensors that provide continuous visibility Respond to threats immediately On-premises, at endpoints or in the cloud, the Qualys Cloud Platform sensors are always on, giving you continuous 2-second visibility of all your IT assets. Remotely deployable, centrally managed and self-updating, the sensors come as physical or virtual appliances, or lightweight agents. With Qualys Cloud Agent technology, there s no need to schedule scan windows or manage credentials for scanning. And Qualys Continuous Monitoring service lets you proactively address potential threats whenever new vulnerabilities appear, with real-time alerts to notify you immediately. All data analyzed in real time Qualys Cloud Platform provides an end-to-end solution, allowing you to avoid the cost and complexities that come with managing multiple security vendors. The Qualys Cloud Platform automatically gathers and analyzes security and compliance data in a scalable, state-of-the-art backend, and provisioning additional cloud apps is as easy as checking a box. See the results in one place, anytime, anywhere Qualys Cloud Platform is accessible directly in the browser, no plugins necessary. With an intuitive, single-pane-of-glass user interface for all its apps, it lets you customize dashboards, drill down into details, and generate reports for teammates and auditors. Cloud Platform Apps Qualys apps are fully integrated and natively share the data they collect for real-time analysis and correlation. Provisioning another app is as easy as checking a box. ASSET MANAGEMENT WEB APP SECURITY CLOUD SECURITY AI Asset Inventory WAS Web App Scanning CI Cloud Inventory SYN CMDB Sync WAF Web App Firewall CSA Cloud Security Assessment IT SECURITY COMPLIANCE MONITORING CERTIFICATE SECURITY VM Vulnerability Management PC Policy Compliance CRI Certificate Inventory TP Threat Protection SCA Security Configuration Assessment CRA Certificate Assessment CM Continuous Monitoring PCI PCI Compliance IOC Indication of Compromise FIM File Integrity Monitoring CS Container Security SAQ Security Assessment Questionnaire Request a full trial (unlimited-scope) at qualys.com/trial Qualys is easy to implement, easy to use, fully scalable and requires NO infrastructure or software to maintain. 2018 Qualys, Inc. All rights reserved. 7/18