Organizations' perimeters today are very distributed, complex and highly dynamic. There are often various operational teams managing firewalls, load balancers, systems, applications and databases, making frequent changes to a network environment independent of one another. Perimeter scanning and response to unintentional security holes created by these changes is often event-driven and only performed at designated times, rather than on a continuous, always-on basis. This presents a significant opportunity for cybercriminals to exploit newly introduced vulnerabilities and infiltrate corporate networks in between scans.
"In an era of continuous compromise, enterprises need to shift from a mindset of 'incident response' -- wherein incidents are thought of as occasional, one-off events -- to a mindset of continuous response -- wherein attacks are relentless, hackers' ability to penetrate systems and information is never fully blocked, and systems must be assumed to be continuously compromised, and this, they must be continuously monitored," said
Qualys Continuous Monitoring provides organizations with a comprehensive, always-on view of potential security holes, enabling organizations to immediately identify and proactively address potential threats before they turn into breaches. Built on the Qualys Cloud Platform used by Fortune 1000 and organizations around the globe, Continuous Monitoring uses its elastic scanning capacity to dynamically scale to continuously scan networks of any size and scope, and instantly provide alerts as soon as an unauthorized change is detected.
"More and more customers are asking us to help them address 'toxic combination' type scenarios that can lead to compromises in their IT environments. An example of this could be a server that exhibits a combination of configurations or vulnerabilities that can make it susceptible to attacks," said
Qualys Continuous Monitoring now includes:
- Integration with Leading SIEM Providers - a new extensible API interface incorporates alerts into incident response and monitoring systems via integrations with leading security incident and event management (SIEM) platforms, including Splunk and HP ArcSight
- Common Event Format (CEF) Support - use CEF format to send events into all popular SIEM and incident response products and get email alerts delivered directly to the inbox
In addition, Qualys Continuous Monitoring allows businesses to continuously monitor and respond to any of these combinations:
- New Hosts - to see whenever systems appear, disappear, or are running unexpected operating systems
- OS Changes on Existing Hosts - to see when changes have been made to operating systems on systems
- Open Ports/Services - to keep tabs on network ports including newly opened ports, changes to ports, new services on ports, and closing of ports
- SSL Certificates - to track SSL certificates used on systems including expired, soon-to-expire, rogue or unknown certificates
- Vulnerabilities Changes - to know when there are changes in vulnerabilities including new, re-opened and closed instances
- Software Changes - such as installation of new software, upgrades or downgrades of existing software, and removals
Availability
Qualys Continuous Monitoring is available immediately and sold via annual subscription, based on the number of perimeter IPs. To learn more about Continuous Monitoring or see a demo, visit https://www.qualys.com/enterprises/qualysguard/continuous-monitoring/.
Additional Resources
- Learn more about Qualys Continuous Monitoring
- Register for a demo of Qualys Continuous Monitoring
- Visit the
Qualys expo booth (#211) atBlack Hat USA 2014 - Follow
Qualys on Facebook and Twitter
About
Source:
News Provided by Acquire Media