Qualys CEO Philippe Courtot

Qualys CEO Philippe Courtot

Qualys Adds New API Interface, Automated Alerts to CM Cloud Service

Qualys (QLYS) has added new features to its Continuous Monitoring (CM) cloud service.

Cloud security and solutions provider Qualys (QLYS) has added several features to its Continuous Monitoring (CM) cloud service, including a new application programming interface (API) and automated alerts.

The service's new features "provide organizations with the most comprehensive view of their security perimeters while empowering them to proactively identify and address potential threats," according to Qualys.

"Continuous Monitoring ​brings two critical elements -- context and automated alerts that managed service providers (MSPs) can seamlessly integrate with their incident response center," Qualys CEO Philippe Courtot told MSPmentor. "As a result, MSPs can eliminate the large majority of the false alerts coming from [their] intrusion detection and intrusion prevention monitoring systems so they can take action on high-risk vulnerabilities before hackers can exploit them."

Qualys noted CM allows organizations to identify threats and unexpected changes in their Internet perimeter to help prevent data breaches.

The service now provides:

  • An extensible API interface that incorporates alerts into incident response and monitoring systems via integrations with security incident and event management (SIEM) platforms
  • Automated alerts for changes in perimeter IP addresses
  • Common Event Format (CEF) support to send events into SIEM and incident response products and get email alerts delivered directly to an inbox

CM is available immediately and sold via annual subscription based on the number of perimeter IPs.

What is the long-term impact of CM?

Courtot said CM's new features could have far-flung effects on MSPs.

Continuous IT monitoring is vital to identify and manage security vulnerabilities, Courtot said, and Qualys' cloud service now enables MSPs to manage risks and take corrective action when necessary.

"Such [a] novel approach drastically changes vulnerability management, as it allows organizations to move from analyzing reports to receiving alerts," he added.

Share your thoughts about this story in the Comments section below, via Twitter @dkobialka or email me at [email protected].

Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.