Security News > 2021 > June > Helping security teams respond to gaps in security and compliance programs with Qualys CSAM
While traditional IT teams and inventory tools provide an IT view of inventory, software support, and licensing, security teams are looking for the security context of assets such as assets that are not running security tools, detection of unauthorized software, internet visibility, and more.
Security tools like EDR help secure assets, but do not let security teams know which critical assets are not running EDR, or if databases are visible from the internet? All security teams have defined authorized and unauthorized software policies.
Asset inventory data specifically managed with security context helps security teams continuously assess asset risk, detect at-risk assets, and prioritize an often overwhelming number of security issues so they can respond quickly.
Security teams don't just want a list of static issues and adding security context on an ad hoc basis or manually on top of IT asset inventory doesn't work.
The app fills the gap between traditional IT inventory and the core security functions by overlaying key business and asset criticality data, establishing unauthorized and authorized software lists, applying current and upcoming EOL/EOS data, providing an outside-in view of the organization's internet-facing assets, highlighting security endpoint blind spots, monitoring the result with policy-based alerts, and facilitating appropriate response with software uninstall.
Qualys CSAM allows teams to focus security prioritization efforts on high-importance and high-risk assets using Asset Criticality.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/hNBwC2TKd0M/
Related news
- AWS security essentials for managing compliance, data protection, and threat detection (source)
- CISOs in 2025: Balancing security, compliance, and accountability (source)
- Navigating the compliance labyrinth: A CSO’s guide to scaling security (source)
- Microsoft Ignite 2024 Unveils Groundbreaking AI, Security, and Teams Innovations (source)
- Key steps to scaling automated compliance while maintaining security (source)