
Get a complete, continuously updated view of every asset across your hybrid IT environment.
CyberSecurity Asset Management (CSAM) is a cloud service that allows you to continuously discover, classify, remediate, and measurably improve your organization's cybersecurity posture for internal and external IT assets.
Using a combination of Qualys sensors such as Cloud Agents, Scanners, and Passive Network Sensors, CSAM collects and analyzes data about assets across hybrid environments, and delivers up-to-date, comprehensive, and continuous information about those assets as well as their security and compliance posture.
Maintain a real-time, asset inventory enriched with context such as hardware, software, and business context.
Learn More →
EASM helps you find and monitor external risks before attackers do.
Learn More →
A centralized software inventory to discover applications, track lifecycle, and detect risks and unauthorized software.
Learn More →
Web Applications Inventory helps you discover and secure all web assets with Qualys Web Application Scanning integration.
Learn More →
Open Ports inventory provides real-time visibility into open ports and services to identify risks across internal and externally exposed assets with EASM.
Learn More →
Track SSL/TLS certificates, detect weak configurations, and manage risks with the certificates inventory.
Learn More →
Database Inventory gives you clear visibility into database assets, helping you discover, classify, and secure them for compliance.
Learn More →
Business Application Inventory brings business context to your assets, helping you prioritize risk smarter with TruRiskâ„¢.
Learn More →
Monitor internet-facing domains and detect takeover risks.
Learn More →
Organization/Subsidiary view helps you track external assets by business valuation and prioritize risk with TruRiskâ„¢.
Learn More →
Static and dynamic tags to organize assets manually or automatically based on rules.
Learn More →
Asset Criticality Score (ACS) measures business importance, while TruRiskâ„¢ turns it into risk-based remediation priorities.
ACS → | TruRisk™ →
SwCA provides real-time visibility into deeply embedded open-source software packages and commercial software components.
Learn More →
Reports provide visibility into your assets and security posture. Generate, customize, and schedule reports including Asset Details, Software Details, and Technology Debt.
Learn More →
Configure rules to monitor critical events based on specific conditions. When an event matches these conditions, you will receive an alert notification.
Learn More →
Roles and Permissions
Configure user roles and define the permissions associated with each role.
Learn More →Dynamic Dashboard
Use dashboards to visualize your assets, see your threat exposure, leverage saved searches, and quickly fix the priority of vulnerabilities.
Learn More →CSAM APIs
Automate asset discovery and asset data management using CSAM APIs.
CSAM v2 APIs →Get the most out of your Qualys CSAM with these helpful resources.