New File Integrity Monitoring (FIM) service based on Qualys Cloud Agent enables organizations to increase visibility and security while removing point-product agents from their endpoints
New Indicators of Compromise (IOC) service provides continuous detection of compromised IT assets across endpoints, on-premise or elastic cloud environments
"With FIM and
Qualys File Integrity Monitoring (FIM) - Qualys FIM logs and centrally tracks file change events across global IT systems, delivering users a single-view dashboard from which to detect and identify critical changes, incidents, and audit risks resulting from normal patching and administrative tasks, change control exceptions or violations, or malicious activity. As a cloud-based solution, Qualys FIM scales visibility and control to a variety of enterprise operating systems without the need to deploy and maintain complex security infrastructure. This allows teams to improve compliance, reduce downtime and limit damage resulting from compromise without the expense of a software-based solution. File Integrity Monitoring offers:
- Preconfigured content: Deciding what to monitor is a challenge for most security teams, so FIM comes with out-of-the-box profiles based on industry best practices and vendor-recommended guidelines for common compliance and audit requirements, including PCI mandates.
- Real-time change engine: The Qualys Cloud Agent continuously monitors the files and directories specified in the monitoring profile and captures critical data to identify what changed along with environment details such as which user and process was involved.
- Automated change review: Qualys FIM provides review workflows and points for external integration to reduce the data users have to look at so they can focus on critical changes and violations first.
Qualys Indicators of Compromise (IOC) - Qualys IOC continuously monitors endpoint activity to detect suspicious activity that may indicate the presence of known malware, unknown variants, and threat actor activity on devices both on and off the network. Qualys IOC integrates endpoint detection, behavioral malware analysis, and threat hunting techniques that incorporate a continuous view of an asset's vulnerability posture along with suspicious activity monitoring. Indicators of Compromise offers:
- Continuous event collection: Qualys IOC uses the Cloud Agent's non-intrusive data collection and delta processing techniques to transparently capture endpoint activity information from assets on and off the network in a way that is more performant than other solutions' query-based approaches or distributed data collectors.
- Highly scalable detection processing: Analysis, hunting, and threat indicator processing is performed in the cloud on billions of active and past endpoint events. Those results are then coupled with threat intelligence data from
Qualys Malware Labs and third-party threat intelligence sources to identify malware infections (indicators of compromise) and threat actor actions (indicators of activity). - Actionable intelligence for security analysts: Confidence-scored alerts are displayed in the
Qualys platform's web-based user interface with contextual asset tags to help security teams prioritize responses for critical business systems.
"Breaches continue to rise despite the investments in traditional mechanisms that organizations have deployed to support their businesses in the new era of digital transformation," said
Qualys FIM and
- Easy setup and no maintenance: FIM and
IOC modules operate on endpoints via the lightweight Qualys Cloud Agent. Modules can be instantly activated across any or all assets without reinstalling the agent or rebooting the endpoint. - Minimal performance impact: The Cloud Agent minimizes performance impact on the endpoint by simply monitoring for file changes and system activity locally, sending all data to the Qualys Cloud Platform for storage, correlation, analysis, and reporting.
- Unified security posture:
Qualys presents FIM andIOC alert data for on-premise assets, cloud server instances, and off-net remote endpoints in a single view that is integrated with the asset's inventory, vulnerability posture, and policy compliance controls, even for assets that are currently offline -- thus significantly reducing the time required to effectively detect and respond to threats before breach or compromise can occur. - Integration with AssetView: Security analysts can make use of dynamic dashboards, interactive and saved searches, and visual widgets in Qualys AssetView to monitor changes within the context of asset groups.
Availability
Qualys FIM and
Additional Resources:
- Follow
Qualys on LinkedIn and Twitter - Read more about the Qualys Cloud Agent
- Visit
Qualys at RSA ConferenceUSA Booth N3817
About
QUALYS MEDIA CONTACT
dconner@qualys.com
650-801-6196
Source:
News Provided by Acquire Media