Qualys (QLYS) has added new features to its Continuous Monitoring (CM) cloud service.

Dan Kobialka, Contributing writer

August 4, 2014

2 Min Read
Qualys CEO Philippe Courtot
Qualys CEO Philippe Courtot

Cloud security and solutions provider Qualys (QLYS) has added several features to its Continuous Monitoring (CM) cloud service, including a new application programming interface (API) and automated alerts.

The service’s new features “provide organizations with the most comprehensive view of their security perimeters while empowering them to proactively identify and address potential threats,” according to Qualys.

“Continuous Monitoring ​brings two critical elements — context and automated alerts that managed service providers (MSPs) can seamlessly integrate with their incident response center,” Qualys CEO Philippe Courtot told MSPmentor. “As a result, MSPs can eliminate the large majority of the false alerts coming from [their] intrusion detection and intrusion prevention monitoring systems so they can take action on high-risk vulnerabilities before hackers can exploit them.”

Qualys noted CM allows organizations to identify threats and unexpected changes in their Internet perimeter to help prevent data breaches.

The service now provides:

  • An extensible API interface that incorporates alerts into incident response and monitoring systems via integrations with security incident and event management (SIEM) platforms

  • Automated alerts for changes in perimeter IP addresses

  • Common Event Format (CEF) support to send events into SIEM and incident response products and get email alerts delivered directly to an inbox

CM is available immediately and sold via annual subscription based on the number of perimeter IPs.

What is the long-term impact of CM?

Courtot said CM’s new features could have far-flung effects on MSPs.

Continuous IT monitoring is vital to identify and manage security vulnerabilities, Courtot said, and Qualys’ cloud service now enables MSPs to manage risks and take corrective action when necessary.

“Such [a] novel approach drastically changes vulnerability management, as it allows organizations to move from analyzing reports to receiving alerts,” he added.

Share your thoughts about this story in the Comments section below, via Twitter @dkobialka or email me at [email protected].

About the Author(s)

Dan Kobialka

Contributing writer, Penton Technology

Dan Kobialka is a contributing writer for MSPmentor and Talkin' Cloud. In the past, he has produced content for numerous print and online publications, including the Boston Business Journal, Boston Herald and Patch.com. Dan holds a M.A. in Print and Multimedia Journalism from Emerson College and a B.A. in English from Bridgewater State College (now Bridgewater State University). In his free time, Kobialka enjoys jogging, traveling, playing sports, touring breweries and watching football (Go Patriots!).  

Free Newsletters for the Channel
Register for Your Free Newsletter Now

You May Also Like