Security News > 2021 > May > Qualys CyberSecurity Asset Management brings security teams the automation they need
Security teams need to monitor IT asset health from a cybersecurity perspective by detecting security tool blind spots and responding to exposures quickly.
"As an organization focused on Security Operations, we believe that 'you can't protect what you don't understand,' with understand being the key word. Hence, asset management in the security operations context isn't just 'seeing' an asset; it is having the right 'risk' context of each and every software, hardware and IoT asset at our fingertips," said Jatinder Pal Singh, director of security operations at Informatica.
"Our SOC asset management leverages the Qualys CyberSecurity Asset Management app to not only provide the visibility we need, but it goes a step further and assesses every asset's security risk, enabling our SOC to not only get relevant alerts but enable the IR analyst to take appropriate and timely actions."
CyberSecurity Asset Management is an all-in-one solution that leverages the power of the Qualys Cloud Platform with its multiple native sensors and CMDB synchronization to continuously inventory known and unknown assets, discover installed applications, and overlay business and risk context to establish asset criticality.
"CSAM is more than a list of IT assets, as it leverages vital context from the Qualys Cloud Platform to identify, consolidate and prioritize critical assets. The platform, in turn, provides the orchestration needed for the security team to take swift action to mitigate risk while eliminating the need to pass reports back and forth between IT and security. By providing a platform-based approach to the challenge of asset security response, Qualys is helping to distinguish itself in this market," noted Tanner Johnson, principal analyst at Omdia.
"CSAM uses telemetry from multiple sensors including the Qualys Cloud Agent to bring security teams the automation they need to identify and manage the gaps in their IT asset inventory."
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/AF6sZGVkmwY/
Related news
- Top 5 Cloud Security Automations for SecOps Teams (source)
- 4 Top Security Automation Use Cases: A Detailed Guide (source)
- Digital Maturity Key to AI Success in Australian Cyber Security (source)
- Businesses turn to private AI for enhanced security and data management (source)
- Enhancing firewall management with automation tools (source)
- One-Third of UK Teachers Lack Cybersecurity Training, While 34% Experience Security Incidents (source)
- SOC teams are frustrated with their security tools (source)
- Week in review: Microsoft fixes two exploited zero-days, SOC teams are losing trust in security tools (source)
- Strengthen your cybersecurity with automation (source)