Welcome to

CyberSecurity Asset Management (CSAM) Help

Get a complete, continuously updated view of every asset across your hybrid IT environment.

What is CSAM

CyberSecurity Asset Management (CSAM) is a cloud service that allows you to continuously discover, classify, remediate, and measurably improve your organization's cybersecurity posture for internal and external IT assets.

Using a combination of Qualys sensors such as Cloud Agents, Scanners, and Passive Network Sensors, CSAM collects and analyzes data about assets across hybrid environments, and delivers up-to-date, comprehensive, and continuous information about those assets as well as their security and compliance posture.

CSAM Journey 

Discover and Inventory Assets

Discovers and gathers information about assets in your environment.

Aggregate and Correlate

Aggregates asset data from all sources and correlates records to create a single asset profile, eliminating duplicates.

Enrich with Business Context

Adds business metadata, such as owner, business unit, criticality, and application mapping, to assets.

Report and Respond

Enables you to define alerts and generate reports.

Key features of CSAM

Asset Inventory

⟳

Maintain a real-time, asset inventory enriched with context such as hardware, software, and business context.

Learn More →

External Attack Surface Management (EASM)

⟳

EASM helps you find and monitor external risks before attackers do.

Learn More →

Software Inventory

⟳

A centralized software inventory to discover applications, track lifecycle, and detect risks and unauthorized software.

Learn More →

Web Applications Inventory

⟳

Web Applications Inventory helps you discover and secure all web assets with Qualys Web Application Scanning integration.

Learn More →

Open Ports Inventory

⟳

Open Ports inventory provides real-time visibility into open ports and services to identify risks across internal and externally exposed assets with EASM.

Learn More →

Certificates Inventory

⟳

Track SSL/TLS certificates, detect weak configurations, and manage risks with the certificates inventory.

Learn More →

Database Inventory

⟳

Database Inventory gives you clear visibility into database assets, helping you discover, classify, and secure them for compliance.

Learn More →

Business App Inventory

⟳

Business Application Inventory brings business context to your assets, helping you prioritize risk smarter with TruRiskâ„¢.

Learn More →

Domains Inventory

⟳

Monitor internet-facing domains and detect takeover risks.

Learn More →

Organization/Subsidiary Inventory

⟳

Organization/Subsidiary view helps you track external assets by business valuation and prioritize risk with TruRiskâ„¢.

Learn More →

Static and Dynamic Tags

⟳

Static and dynamic tags to organize assets manually or automatically based on rules.

Learn More →

Asset Criticality and TruRisk™ Score

⟳

Asset Criticality Score (ACS) measures business importance, while TruRiskâ„¢ turns it into risk-based remediation priorities.

ACS → | TruRisk™ →

Software Composition Analysis (SwCA)

⟳

SwCA provides real-time visibility into deeply embedded open-source software packages and commercial software components.

Learn More →

Reporting

⟳

Reports provide visibility into your assets and security posture. Generate, customize, and schedule reports including Asset Details, Software Details, and Technology Debt.

Learn More →

Alerting

⟳

Configure rules to monitor critical events based on specific conditions. When an event matches these conditions, you will receive an alert notification.

Learn More →

Rules, Integrations, and More

Rules Integrations
Software Rules ServiceNow CMDB
Port Rules Web Aapplication Scanning (WAS)
Asset Purge Rules Cloud Agent as Passive Sensor (CAPS)
Reconciliation Rules TotalCloud (TC)
Asset Identification Rule Container Security (CS)
  Network Passive Sensor (NPS)
  VMDR Mobile

How do I get started with CSAM

Prerequisites

Start building your inventory by installing cloud agents. 

Learn More →

Roles and Permissions

Configure user roles and define the permissions associated with each role.

Learn More →

Expand Inventory

Use other Qualys applications to expand your asset inventory.

Learn More →

Dynamic Dashboard

Use dashboards to visualize your assets, see your threat exposure, leverage saved searches, and quickly fix the priority of vulnerabilities.

Learn More →

CSAM APIs

Automate asset discovery and asset data management using CSAM APIs.

CSAM v2 APIs →
CSAM v1 APIs →

Looking for something else

Get the most out of your Qualys CSAM with these helpful resources.

Training Videos Knowledge Base Articles Blogs Support Product ToursFAQs

Get Started?