Get Started with CyberSecurity Asset Management

CyberSecurity Asset Management (CSAM) helps you to identify all systems comprehensively, detect at-risk assets, and respond with appropriate actions to mitigate risk.

CSAM helps you to accurately assess complex IT infrastructure and quickly identify and remediate risk. Using a combination of Qualys sensors — Cloud Agents, scanners and passive network sensors — CSAM collects and analyzes data about assets across hybrid environments, and delivers up-to-date, comprehensive and continuous information about those assets as well as their security and compliance posture.

How does it work?

With CSAM, you’ll identify all systems comprehensively, detect at-risk assets, and respond with appropriate actions to mitigate risk.

Home page

Discover and Inventory - Discover assets in  your environment and collect inventory information about those assets.

Detect and Monitor - Detect potential asset health issues and monitor the health of your environment based on defined criteria.

Report and Respond - Configure actions and reports related to your environment.

Get started by installing cloud agents

Start building your inventory by installing cloud agents. With our lightweight agents you’ll get continuous network security updates through the cloud. As soon as changes are discovered on your hosts they’ll be assessed and you’ll know about new security threats right away.

You can have cloud agents on private clouds, public clouds, on premise and endpoints to continuously discover your IT assets providing 100% real-time visibility.

Know more

Expand your inventory with other Qualys Modules

Use other Qualys solutions to expand your inventory. CloudView to expand with cloud resource information, Secure Enterprise Mobility to expand with mobile devices, and Network Passive Sensor to discover unknown devices in the network. You can take actions from the Home page only if you have appropriate permissions.

Qualys CloudView

Use our CloudView App to get complete visibility of your cloud resources such as public cloud workloads and infrastructure. You can sign up for free trial or request for a demo to see how it works.

Know more

Security Enterprise Mobility (SEM)

Use the Qualys Secure Enterprise Mobility app to complete visibility, security and continuous monitoring for your mobile devices and data. Just request access to the SEM.

Know more

Container Security (CS)

Use the Qualys Container Security which provides discovery, tracking, and continuously protecting container environments. Just request access to the CS.

Know more

Network Passive Sensor

Get Qualys Network Passive Sensor to identify known and unknown assets in your network instantaneously and eliminate blind spots across your IT environment. Sign up for the beta if you're interested in this free sensor.

Know more

Synchronize with your ServiceNow CMDB

Now that you’ve built up your inventory, you can can sync with your CMDB to get asset, business application, and business service attributes.

Use the Qualys CMDB Sync Service Graph Connector app to synchronize assets between ServiceNow CMDB and the Qualys Cloud Platform automatically.  

Know more

Synchronize with Shodan to Get Attack Surface Visibility

Integration with third-party sources like gives an outside in view to find assets exposed to the internet, flagging known ‘managed’ assets, identifying unknown assets, and enabling security risk assessment.

Know more

Synchronize with External Attack Surface Management

Integration with EASM gives you comprehensive visibility to monitor the external-facing organization’s infrastructure network to discover the vulnerable systems, target attacks, and campaigns.  

Know more

Roles and Permissions

Users are created using the VM module. Non-Manager users must be granted permission to access the AI application in the subscription. A Manager or user with the Edit User permission can do this using the Administration utility. Know more about Roles and permissions.

Dynamic dashboards

Dashboards help you visualize your assets, see your threat exposure, leverage saved searches, and fix priority of vulnerabilities quickly.

We have integrated Unified Dashboard (UD) with CSAM. UD brings information from all Qualys applications into a single place for visualization. UD provides a powerful new dashboarding framework along with platform service that will be consumed and used by all other products to enhance the existing dashboard capabilities.

You can use the default CSAM dashboard provided by Qualys or easily configure widgets to pull information from other modules/applications and add them to your dashboard. You can also add as many dashboards as you like to customize your vulnerability posture view.

See the Unified Dashboard help for more information.

Global Dashboard Permissions

Your access to Unified Dashboard depends on the global permissions granted to you from the Admin utility. Refer to the Online Help in the Admin utility for information on Global Dashboard Permissions.

Note: When you assign the Global Dashboard permissions to a role, the Global Dashboard permissions override the module-specific dashboard permissions. As a result, the module-specific dashboard permissions are ignored.