Security News > 2021 > May > Qualys CyberSecurity Asset Management brings security teams the automation they need
Security teams need to monitor IT asset health from a cybersecurity perspective by detecting security tool blind spots and responding to exposures quickly.
"As an organization focused on Security Operations, we believe that 'you can't protect what you don't understand,' with understand being the key word. Hence, asset management in the security operations context isn't just 'seeing' an asset; it is having the right 'risk' context of each and every software, hardware and IoT asset at our fingertips," said Jatinder Pal Singh, director of security operations at Informatica.
"Our SOC asset management leverages the Qualys CyberSecurity Asset Management app to not only provide the visibility we need, but it goes a step further and assesses every asset's security risk, enabling our SOC to not only get relevant alerts but enable the IR analyst to take appropriate and timely actions."
CyberSecurity Asset Management is an all-in-one solution that leverages the power of the Qualys Cloud Platform with its multiple native sensors and CMDB synchronization to continuously inventory known and unknown assets, discover installed applications, and overlay business and risk context to establish asset criticality.
"CSAM is more than a list of IT assets, as it leverages vital context from the Qualys Cloud Platform to identify, consolidate and prioritize critical assets. The platform, in turn, provides the orchestration needed for the security team to take swift action to mitigate risk while eliminating the need to pass reports back and forth between IT and security. By providing a platform-based approach to the challenge of asset security response, Qualys is helping to distinguish itself in this market," noted Tanner Johnson, principal analyst at Omdia.
"CSAM uses telemetry from multiple sensors including the Qualys Cloud Agent to bring security teams the automation they need to identify and manage the gaps in their IT asset inventory."
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/AF6sZGVkmwY/
Related news
- The cybersecurity gender gap: How diverse teams improve threat response (source)
- A closer look at the 2023-2030 Australian Cyber Security Strategy (source)
- Setting a security standard: From vulnerability to exposure management (source)
- The ROI of Security Investments: How Cybersecurity Leaders Prove It (source)
- Microsoft Ignite 2024 Unveils Groundbreaking AI, Security, and Teams Innovations (source)
- Australia Passes Groundbreaking Cyber Security Law to Boost Resilience (source)
- Top 5 Cyber Security Trends for 2025 (source)
- Shape the future of UK cyber security (source)
- Strengthening security posture with comprehensive cybersecurity assessments (source)
- Overlooking platform security weakens long-term cybersecurity posture (source)