Qualys Cloud Platform

Similar documents
Qualys Cloud Platform

Investor presentation. Philippe Courtot, Chairman and CEO Melissa Fisher, CFO

Everything visible. Everything secure.

Investor presentation

Investor presentation. Philippe Courtot, Chairman and CEO Melissa Fisher, CFO

Regaining Our Lost Visibility

Automating Security Practices for the DevOps Revolution

SYMANTEC DATA CENTER SECURITY

CLOUD WORKLOAD SECURITY

Real-Time Vulnerability Management Operationalizing the VM process from detection to remediation

Community Edition Getting Started Guide. July 25, 2018

Où en sommes-nous, où va le marché?

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Unlocking the Power of the Cloud

Qualys Cloud Platform

Securing the Modern Data Center with Trend Micro Deep Security

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Datacenter Security: Protection Beyond OS LifeCycle

Real-Time Vulnerability Management Operationalizing the VM process from detection to remediation

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Infoblox as Part of the Ecosystem

Securing Your Cloud Introduction Presentation

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

SIEMLESS THREAT DETECTION FOR AWS

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

AWS Reference Design Document

McAfee Public Cloud Server Security Suite

State of Cloud Adoption. Cloud usage is over 90%, are you ready?

Securing Your Amazon Web Services Virtual Networks

McAfee Cloud Workload Security Product Guide

How to manage evolving threats on evolving ICT assets across Enterprise

Enterprise & Cloud Security

Automating the Top 20 CIS Critical Security Controls

VMware Hybrid Cloud Solution

Cisco Tetration Analytics

Securing Your Microsoft Azure Virtual Networks

HALO IN ACTION COMPLIANCE DON T LET LEGACY SECURITY TOOLS HOLD UP PCI COMPLIANCE IN THE CLOUD. Automated PCI compliance anytime, anywhere.

Getting Started with AWS Security

The threat landscape is constantly

Symantec Endpoint Protection Family Feature Comparison

Real-Time Vulnerability Management Operationalizing the VM process from detection to remediation

Qualys highlights its adaptability to digital transformation at QSC 17

Copyright 2011 Trend Micro Inc.

Reference Guide Revision B. McAfee Cloud Workload Security 5.0.0

First Look Showcase. Expanding our prevention, detection and response solutions. Marco Rottigni Chief Technical Security Officer, Qualys, Inc.

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0

DATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure

First Look Showcase. Expanding our prevention, detection and response solutions. Sumedh Thakar Chief Product Officer, Qualys, Inc.

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

UNIFICATION OF TECHNOLOGIES

THE RSA SUITE NETWITNESS REINVENT YOUR SIEM. Presented by: Walter Abeson

Five Essential Capabilities for Airtight Cloud Security

Dynamic Datacenter Security Solidex, November 2009

QUALYS SECURITY CONFERENCE Qualys CertView. Managing Digital Certificates. Jimmy Graham Senior Director, Product Management, Qualys, Inc.

Vulnerability Management

CyberPosture Intelligence for Your Hybrid Infrastructure

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

The Why, What, and How of Cisco Tetration

VMware Cloud on AWS Technical Deck VMware, Inc.

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

The Next Generation Security Platform. Domenico Stranieri Pre- Sales Engineer Palo Alto Networks EMEA Italy

Build a Software-Defined Network to Defend your Business

AKAMAI CLOUD SECURITY SOLUTIONS

HOW CLOUD, MOBILITY AND SHIFTING APP ARCHITECTURES WILL TRANSFORM SECURITY: GAINING THE HOME-COURT ADVANTAGE

How to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud

Cisco Firepower NGFW. Anticipate, block, and respond to threats

One Hospital s Cybersecurity Journey

Authoritative IPAM QuickStart

Security Configuration Assessment (SCA)

Total Security Management PCI DSS Compliance Guide

Converged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products

Securing the Software-Defined Data Center

The Oracle Trust Fabric Securing the Cloud Journey

Consulting Edition Getting Started Guide. October 3, 2018

Unify DevOps and SecOps: Security Without Friction

ALIENVAULT USM FOR AWS SOLUTION GUIDE

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. Ralf Kaltenbach, Regional Director RSA Germany

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

ORACLE MANAGED CLOUD SECURITY SERVICES - SERVICE DESCRIPTIONS. December 1, 2017

McAfee Virtual Network Security Platform

Security Readiness Assessment

THE IMPACT OF HYBRID AND MULTI CLOUDS TO CYBERSECURITY PRIORITIES

AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs

Threat Containment and Operations. Yong Kwang Kek, Director of Presales SE, APJ

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend

Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops.

Key Technologies for Security Operations. Copyright 2014 EMC Corporation. All rights reserved.

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Challenges 3. HAWK Introduction 4. Key Benefits 6. About Gavin Technologies 7. Our Security Practice 8. Security Services Approach 9

Cloud Workload Discovery 4.5.1

BUYER S GUIDE EVALUATING VULNERABILITY ASSESSMENT SOLUTIONS

Azure Stack: The hybrid cloud revolution

Managed Platform for Adaptive Computing mpac

A CISO GUIDE TO MULTI-CLOUD SECURITY Achieving Transparent Visibility and Control and Enhanced Risk Management

Best Practices in Securing a Multicloud World

Transcription:

Qualys Cloud Platform Our Journey into the Cloud: The Qualys Cloud Platform & Architecture Thomas Wendt Regional Manager Post-Sales, DACH, Qualys Inc.

Digital Transformation More than just adopting new technology Powered by IT innovation Security can t be after thought 11 March 2018 2

Digital Transformation DevOps Innovation Cloud Migration Container Revolution Scale & Elasticity 11 March 2018 3

Digital Transformation Cloud Infrastructure More of IaaS & PaaS But still running your code 11 March 2018 4

Digital Transformation What about Security? DevSecOps! Built-in not bolted-on More Dev than Sec or Ops 11 March 2018 5

Our Journey into the Cloud Hindered by the Silos Datacenter Infrastructure Security Corporate User Endpoint Security Cloud Security Web application security (AppSec) CI/CD security automation (DevOps/DevSecOps) IT Asset Configuration Compliance & Audit 11 March 2018 6

Plethora of Point Solutions Both Legacy and Next-Gen SIEM Console Console Console (FIM) Console (VM) Console (EDR) Console (PATCHING) Console Agent Agent Agent Agent Agent Agent Agent 11 March 2018 7

Single Pane of Glass 11 March 2018 8

Single Pane of Glass 11 March 2018 9

Instant Automated Response 11 March 2018 10

Qualys Cloud Platform Unified approach to detection, prevention & response across on-prem, cloud and endpoints On Premise Endpoints Cloud VMware 11 March 2018 11

End-to-end Security Architecture Automated Continuous Monitoring & Response Discovery Prevention Detection Response On-Prem Cloud Mobile Devices OT/ICS IoT CMDB Inventory Security Hygiene Vulnerability Assessment Threat Prioritization Patch Management Configuration Assessment Endpoint Activity Cloud Infra Monitoring Network Activity Security Orchestration Incident Response Quarantine NAC 11 March 2018 12

Qualys Sensors Scalable, self-updating & centrally managed Physical Virtual Cloud/Container Cloud Agents Passive API Legacy data centers Private cloud infrastructure Commercial IaaS & PaaS clouds Light weight, multi-platform Passively sniff on network Integration with Threat Intel feeds Corporate infrastructure Virtualized Infrastructure Pre-certified in market place On premise, elastic cloud & endpoints Real-time device discovery & identification CMDB Integration Continuous security and compliance scanning Continuous security and compliance scanning Fully automated with API orchestration Real-time data collection Identification of APT network traffic Log connectors Continuous security and compliance scanning Continuous evaluation on platform for security and compliance Extract malware files from network for analysis Agentless + Agent Based + Passive 11 March 2018 13

The Backend Scalable, Micro-services, DevOps Scanner Service VM PC WAS WAF FIM Qualys Streaming Data Backone Cloud Agent Service Reporting Analytics IOC Indexing Service Asset Tagging Service 11 March 2018 14

ASSET MANAGEMENT Integrated Cloud Apps Asset Inventory Maintain full, instant visibility of all your global IT assets CMDB Sync Synchronize asset information from Qualys into ServiceNow CMDB Cloud Inventory (Beta) Inventory of all your cloud assets across AWS, Azure, GCP and others Certificate Inventory (Beta in Sep) Inventory of TLS/SSL digital certificates on a global scale IT SECURITY Vulnerability Management Threat Protection Continuous Monitoring Continuously detect and protect against attacks, Pinpoint your most critical threats and Alerts you in real time about network anytime, anywhere prioritize patching irregularities Indication of Compromise (Beta) Continuously monitor endpoints to detect suspicious activity Container Security (Beta) Discover, track, and continuously protect containers Certificate Assessment (Beta in Sep) Assess all your digital certificates for TLS/SSL vulnerabilities COMPLIANCE MONITORING Policy Compliance Assess security configurations of IT systems throughout your network PCI Compliance Automate, simplify and attain PCI compliance quickly File Integrity Monitoring (Beta) Log and track file changes across global IT systems Security Configuration Assessment Automate configuration assessment of global IT assets Cloud Security Assessment (Beta) Security Assessment Questionnaire Get full visibility and control across all public cloud instances Minimize the risk of doing business with vendors and other third parties WEB APPLICATION SECURITY Web Application Scanning Secure web applications with end-to-end protection Web Application Firewall Block attacks and virtually patch web application vulnerabilities 11 March 2018 15

Qualys Cloud Platform Unified approach to prevention and response Integrated Suite of Applications Analytics and Reporting Engines Distributed Sensors Hardware Virtual Cloud Agent Passive API 11 March 2018 16

Single Pane of Glass Via dynamic and customizable dashboards and centrally managed, self-updating, integrated Cloud Apps in a single-pane-of-glass UIs (AssetView, CloudView, CertView ) 1+ trillion Security Events 250+ billion Data Points Indexed on Elasticsearch Clusters 3+ billion IP Scans/Audits a Year 99.9996% Six Sigma Scanning Accuracy 11 March 2018 17

Qualys Cloud Platform Operations Raleigh, NC Signature Updates Software Updates France, EU 6 Public Clouds online in US, EU and IN Public Clouds Redwood Shores, CA Operation, Administration and Maintenance Global Infrastructure 3+ Billion Scans Annually * Pune, India Private Clouds as a Platform Appliance or a Virtual Data Center (50 plus) Private Clouds 11 March 2018 18

Unique advantages of the Qualys Cloud Platform No hardware to buy or manage Lower operating costs Easy to deploy and maintain Unprecedented scaling Nothing to install or manage, and all services are accessible in the cloud via web interface. Qualys operates and maintains everything. With everything in the cloud, there are no capital expenditures, no extra human resources needed, and no infrastructure or software to buy and maintain. Easily perform assessments on geographically distributed and segmented networks at the perimeter, behind the firewall, on dynamic cloud environments and endpoints. Qualys Cloud Platform is a scalable, end-toend solution for all aspects of IT security. Once deployed, seamlessly add new coverage, users and services as you need them. Always Up-to-date Qualys has the largest knowledge base of vulnerability signatures in the industry and performs over 3 billion IP scans per year. All security updates are made in real time. Data stored securely Vulnerability data is securely stored and processed in an n-tiered architecture of load-balanced servers. Our encrypted databases are physically and logically secure. Available as a Public or on-premises Private Cloud Full server rack For governments, enterprises, and MSSPs Virtual rack For governments, enterprises, and MSSPs Standalone appliance For small businesses 11 March 2018 19

Qualys Cloud Platform A new unified approach to prevention and response 2-second visibility across all of your global IT assets (on premise, endpoints and cloud assets) Continuous assessment of your global security & compliance posture Identify compromise-able and compromised assets Consolidate all your security and compliance stacks Secure your digital transformation Drastically reduce your spend 11 March 2018 20

Thank You Thomas Wendt twendt@qualys.com