One Stack to Consolidate Traditional Enterprise Security and Compliance Solutions and Secure the Digital Transformation White Paper | Qualys Cloud Platform
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Securing Microsoft Azure with Qualys
Securing Microsoft Azure with Qualys July 28, 2021 Verity Confidential Copyright 2020-2021 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks are the property of their respective owners. Qualys, Inc. 919 E Hillsdale Blvd 4th Floor Foster City, CA 94404 1 (650) 801 6100 Table of Contents About This Guide ............................................................................................. 5 About Qualys ........................................................................................................................... 5 Qualys Support ........................................................................................................................ 5 Introduction....................................................................................................... 6 Qualys Integrated Security Platform..................................................................................... 6 Pre-requisites ........................................................................................................................... 7 Automate Asset Inventory............................................................................. 9 Deploying Azure Connector ................................................................................................... 9 Pre-requisites..................................................................................................................... 9 Creating Azure Connector with AssetView................................................................. -
Securing Amazon Web Services with Qualys
Securing Amazon Web Services with Qualys July 28, 2021 Verity Confidential Copyright 2017-2021 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks are the property of their respective owners. Qualys, Inc. 919 E Hillsdale Blvd 4th Floor Foster City, CA 94404 1 (650) 801 6100 Table of Contents About this guide............................................................................................... 5 About Qualys ........................................................................................................................... 5 Qualys Support ........................................................................................................................ 5 Introduction....................................................................................................... 6 Qualys Integrated Security Platform..................................................................................... 6 Pre-requisites ........................................................................................................................... 8 Automate Asset Inventory........................................................................... 10 Setting up EC2 Connector..................................................................................................... 10 Cross-Account Role Authentication for EC2 Connectors ........................................... 10 ARN authentication ....................................................................................................... -
Qualys Cloudview User Guide
CloudView User Guide September 20, 2021 Copyright 2019-2021 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks are the property of their respective owners. Qualys, Inc. 919 E Hillsdale Blvd 4th Floor Foster City, CA 94404 1 (650) 801 6100 Table of Contents About this Guide ............................................................................................... 7 About Qualys ........................................................................................................................... 7 Qualys Support ........................................................................................................................ 7 CloudView Overview ....................................................................................... 8 Qualys Subscription and Modules required ......................................................................... 8 Concepts and Terminologies .................................................................................................. 9 Get Started ....................................................................................................... 10 AWS ......................................................................................................................................... 10 Steps to Create AWS Connector .................................................................................... 10 Base Account ...................................................................................................................16 -
Leveraging Continuous Visibility to Secure Global IT Assets for the Digital Transformation
Leveraging Continuous Visibility to Secure Global IT Assets for the Digital Transformation FEATURING RESEARCH FROM FORRESTER Vendor Landscape: Vulnerability Management, 2017 2 An Introduction To The Forrester Vendor Landscape: Vulnerabilty Management, 2017 CONTINUOUS VISIBILITY IS KEY TO SECURING TODAY’S ENTERPRISE The widespread adoption of cloud computing services and mobile devices has drastically changed enterprise information security. Organizations are no longer well served by the conventional approach IN THIS of protecting the traditional corporate perimeter, whose boundaries consisted primarily of desktop DOCUMENT PCs sitting inside offices and servers humming in on-premises data centers. Today, organizations live in a perimeter-less world. Those clearly defined physical boundaries in which their IT infrastructure 1 Leveraging was housed have been pushed out, blurred, transformed and in some cases even erased. Continuous Visibility to Secure Adoption of cloud computing software, platform and infrastructure services -- SaaS, PaaS and Global IT Assets for the Digital IaaS -- continues on the upswing among organizations of all sizes globally as they digitally Transformation transform. Workloads shift from on-premises systems to public, private and hybrid clouds, requirements for asset discovery, security and compliance change significantly, both from security 5 Vendor Landscape: and compliance perspectives. Vulnerability Management, 2017 This shift to virtualized, ephemeral and ever-growing infrastructure changes the size and nature of attack surfaces. If an organization’s most critical vulnerabilities are patched across these assets, it 19 About Qualys greatly increases its protection against attacks that may get through the firewall, such as viruses that arrive via email. To protect against these critical threats, the challenge is effectively immunizing IT assets across an increasingly diverse and widespread landscape of assets: on-premises data centers, public cloud platforms and endpoints. -
Qualys Malware Detection API User Guide
Malware Detection API User Guide February 16, 2021 Copyright 2016-2021 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks are the property of their respective owners. Qualys, Inc. 919 E Hillsdale Blvd 4th Floor Foster City, CA 94404 1 (650) 801 6100 Preface Chapter 1 Welcome Get Started .......................................................................................................................... 7 Get API Notifications........................................................................................................ 7 MD API Framework.......................................................................................................... 8 Base URL to the Qualys API Server......................................................................... 8 XML Output and Schemas ............................................................................................... 9 Introduction to MD API Paradigm ............................................................................... 10 Know your Portal Version.............................................................................................. 14 Chapter 2 MD API Search malware detections............................................................................................. 18 View details of a malware detection............................................................................. 21 Current malware detection count ................................................................................ -
Securing Google Cloud Platform with Qualys
Securing Google Cloud Platform with Qualys July 28, 2021 Verity Confidential Copyright 2021 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks are the property of their respective owners. Qualys, Inc. 919 E Hillsdale Blvd 4th Floor Foster City, CA 94404 1 (650) 801 6100 Table of Contents About this guide................................................................................................ 5 About Qualys ........................................................................................................................... 5 Qualys Support ........................................................................................................................ 5 Introduction........................................................................................................6 Qualys Cloud Platform ............................................................................................................ 6 Prerequisites ............................................................................................................................. 7 Scanning in GCP Environments ................................................................... 10 Networking Basics ................................................................................................................. 10 Use Cases for Scanning GCP environment ......................................................................... 10 Deploying Sensors...........................................................................................17 -
Secure Enterprise Mobility User Guide Version 1.1
Secure Enterprise Mobility User Guide Version 1.1 July 25, 2021 Verity Confidential Copyright 2021 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks are the property of their respective owners. Qualys, Inc. 919 E Hillsdale Blvd 4th Floor Foster City, CA 94404 1 (650) 801 6100 Table of Contents About this guide................................................................................................4 About Qualys ........................................................................................................................... 4 Qualys Support ........................................................................................................................ 4 Get Started ......................................................................................................... 5 Configurations ...................................................................................................6 EULA Management .................................................................................................................. 6 APNs Certificates ..................................................................................................................... 8 What is an APNs Certificate? ........................................................................................... 8 Pre-requisites to Generate the Certificate ...................................................................... 8 Steps to Generate APNs Certificate ................................................................................