Average Ratings 0 Ratings
Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
The Qualys TruRisk Platform, previously known as the Qualys Cloud Platform, features an innovative architecture that drives a wide range of cloud applications focused on IT, security, and compliance. With its continuous and always-active assessment capabilities, the Qualys TruRisk Platform allows for real-time, 2-second visibility into your global IT environment, regardless of the location of your assets. Coupled with automated threat prioritization, patch management, and additional response functionalities, it serves as a comprehensive security solution. Whether deployed on-premises, on endpoints, within mobile environments, in containers, or in the cloud, the platform's sensors provide constancy in visibility across all IT assets at every moment. These sensors are designed to be remotely deployed, centrally managed, and self-updating, available as either physical or virtual appliances, or as lightweight agents. By offering an integrated end-to-end solution, the Qualys TruRisk Platform helps organizations sidestep the expenses and complications related to juggling multiple security vendors, ultimately streamlining their security management strategy. This holistic approach ensures that businesses can maintain a robust security posture while focusing on their core operations.
Description
A powerful cloud-based solution enables ongoing discovery and identification of vulnerabilities and misconfigurations in web applications. Designed entirely for the cloud, it offers straightforward deployment and management while accommodating millions of assets with ease. The Web Application Scanner (WAS) systematically locates and records all web applications within your network, including those that are new or previously unidentified, and can scale from just a few applications to thousands. Utilizing Qualys WAS, you have the ability to assign your own labels to applications, allowing for customized reporting and restricted access to scanning results. WAS employs dynamic deep scanning to thoroughly assess all applications within your perimeter, internal environment, active development stages, and APIs that serve mobile devices. Furthermore, it extends its coverage to public cloud instances, providing immediate insight into vulnerabilities such as SQL injection and cross-site scripting. The system supports authenticated, intricate, and progressive scanning methods. In addition, it incorporates programmatic scanning capabilities for SOAP and REST API services, effectively evaluating IoT services and the APIs utilized by contemporary mobile architectures, thereby enhancing your overall security posture. This comprehensive approach ensures that all aspects of your web applications are monitored and protected continuously.
Description
Comprehensive Vulnerability Assessment for Network Security. Vulnerability scans and network scanners can identify top cybersecurity risks like misconfigured firewalls, malware hazards and remote access vulnerabilities. They can be used to help with cyber security and compliance mandates such as PCI Compliance (PCI DSS), and HIPAA.
You can add and remove targets using your Perimeter Scan Portal.
Mass uploading scan targets and groups can be done.
To make it easier to manage scan targets by location, network type or unique circumstances in your organization, you can group and label them.
You can run port scans on the most sensitive targets more often, test in scope PCI targets every quarter, or test designated IPs following changes to your network.
Vulnerability scanning reports include the target, vulnerability type, and service (e.g. https, MySQL, etc.). ), and the severity (low, medium, or high) of each vulnerability.
API Access
Has API
API Access
Has API
API Access
Has API
Integrations
Allgress
Armis
Imperva WAF
Microsoft 365
New Era
OpenText Enterprise Security Manager
Opsera
Optiv Managed XDR
Opus Security
PlexTrac
Integrations
Allgress
Armis
Imperva WAF
Microsoft 365
New Era
OpenText Enterprise Security Manager
Opsera
Optiv Managed XDR
Opus Security
PlexTrac
Integrations
Allgress
Armis
Imperva WAF
Microsoft 365
New Era
OpenText Enterprise Security Manager
Opsera
Optiv Managed XDR
Opus Security
PlexTrac
Pricing Details
$500.00/month
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$99.00/one-time
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Qualys
Founded
1999
Country
United States
Website
www.qualys.com
Vendor Details
Company Name
Qualys
Founded
1999
Country
United States
Website
www.qualys.com/apps/web-app-scanning/
Vendor Details
Company Name
SecurityMetrics
Founded
2000
Country
United States
Website
www.securitymetrics.com/vulnerability-scan
Product Features
Application Security
Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Cloud Workload Protection
Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity
Compliance
Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation
Computer Security
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection
Product Features
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection
Product Features
Vulnerability Management
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection