Product spotlight: Qualys Continuous Monitoring

Today’s cyber attacks are often a result of cyber criminals scanning and attacking networks on a continuous basis, coupled with an event-driven approach to monitoring an organization’s perimeter. As a result, vulnerable machines can be exploited within hours with toxic combinations of scenarios that can lead to compromises in their IT environments such as zero-days and phishing scams, which can instantly expose an organization’s data.

In this podcast recorded at RSA Conference 2015, Wolfgang Kandek, CTO at Qualys, talks about how their Continuous Monitoring (CM) solution for the perimeter now includes internal monitoring capabilities enabling organizations to proactively monitor and get real-time alerts for critical internal IT assets such as desktops, servers and other devices.

Qualys Continuous Monitoring allows organizations to continuously monitor and respond to changes in their internal environment such as new hosts, OS changes, open ports and services, SSL certificates, as well as changes in vulnerabilities and software.

Qualys CM requires no special hardware and can be set up with a few simple clicks. A user simply needs to identify the host or hosts that need to be monitored, who to alert when states change, and what that change might be.

Don't miss