CyberSecurity Asset Management (CSAM) helps you to identify all systems comprehensively, detect at-risk assets, and respond with appropriate actions to mitigate risk.
CSAM helps you to accurately assess complex IT infrastructure and quickly identify and remediate risk. Using a combination of Qualys sensors — Cloud Agents, scanners and passive network sensors — CSAM collects and analyzes data about assets across hybrid environments, and delivers up-to-date, comprehensive and continuous information about those assets as well as their security and compliance posture.
With CSAM, you’ll identify all systems comprehensively, detect at-risk assets, and respond with appropriate actions to mitigate risk.
Discover and Inventory - Discover assets in your environment and collect inventory information about those assets.
Detect and Monitor - Detect potential asset health issues and monitor the health of your environment based on defined criteria.
Report and Respond - Configure actions and reports related to your environment.
Start building your inventory by installing cloud agents. With our lightweight agents you’ll get continuous network security updates through the cloud. As soon as changes are discovered on your hosts they’ll be assessed and you’ll know about new security threats right away.
You can have cloud agents on private clouds, public clouds, on premise and endpoints to continuously discover your IT assets providing 100% real-time visibility.
Use other Qualys solutions to expand your inventory. CloudView to expand with cloud resource information, Secure Enterprise Mobility to expand with mobile devices, and Network Passive Sensor to discover unknown devices in the network. You can take actions from the Home page only if you have appropriate permissions.
Use our CloudView App to get complete visibility of your cloud resources such as public cloud workloads and infrastructure. You can sign up for free trial or request for a demo to see how it works.
Use the Qualys Secure Enterprise Mobility app to complete visibility, security and continuous monitoring for your mobile devices and data. Just request access to the SEM.
Use the Qualys Container Security which provides discovery, tracking, and continuously protecting container environments. Just request access to the CS.
Get Qualys Network Passive Sensor to identify known and unknown assets in your network instantaneously and eliminate blind spots across your IT environment. Sign up for the beta if you're interested in this free sensor.
Now that you’ve built up your inventory, you can can sync with your CMDB to get asset, business application, and business service attributes.
Use the Qualys CMDB Sync Service Graph Connector app to synchronize assets between ServiceNow CMDB and the Qualys Cloud Platform automatically.
Integration with third-party sources like Shodan.io gives an outside in view to find assets exposed to the internet, flagging known ‘managed’ assets, identifying unknown assets, and enabling security risk assessment.
Integration with EASM gives you comprehensive visibility to monitor the external-facing organization’s infrastructure network to discover the vulnerable systems, target attacks, and campaigns.
Users are created using the VM module. Non-Manager users must be granted permission to access the AI application in the subscription. A Manager or user with the Edit User permission can do this using the Administration utility. Know more about Roles and permissions.
Dashboards help you visualize your assets, see your threat exposure, leverage saved searches, and fix priority of vulnerabilities quickly.
We have integrated Unified Dashboard (UD) with CSAM. UD brings information from all Qualys applications into a single place for visualization. UD provides a powerful new dashboarding framework along with platform service that will be consumed and used by all other products to enhance the existing dashboard capabilities.
You can use the default CSAM dashboard provided by Qualys or easily configure widgets to pull information from other modules/applications and add them to your dashboard. You can also add as many dashboards as you like to customize your vulnerability posture view.
Quickly get custom views
Your access to Unified Dashboard depends on the global permissions granted to you from the Admin utility. Refer to the Online Help in the Admin utility for information on Global Dashboard Permissions.
Note: When you assign the Global Dashboard permissions to a role, the Global Dashboard permissions override the module-specific dashboard permissions. As a result, the module-specific dashboard permissions are ignored.