Professional Documents
Culture Documents
PRES PUBLIC v2 QualysGuard - Vulnerability - Management
PRES PUBLIC v2 QualysGuard - Vulnerability - Management
PRES PUBLIC v2 QualysGuard - Vulnerability - Management
1. DISCOVERY
(Mapping)
2. ASSET
6. VERIFICATION
PRIORITISATION
(Rescanning)
(and allocation)
5. REMEDIATION 3. ASSESSMENT
(Treating Risks) (Scanning)
4. REPORTING
(Technical and
Executive)
QualysGuard: Discovery
Mapping
Gives hacker’s eye view of you
network
Enables the detection of rogue
devices (Shadow IT)
QualysGuard: Asset Prioritisation
Asset Prioritisation
Some assets are more critical to
business then others
Criticality depends of business
impact
Asset Allocation
Each asset should have an owner
QualysGuard: Assessment
Signature Classification
Vulnerability Signatures
Application Fingerprints
Service Signatures
Device / OS Fingerprints
Configuration Signatures
Compliance Signatures
QualysGuard Timely
Signatures
725+ Devices/OS
250+ Remote Services
5800+ Vulnerability Signatures
950+ Vendors
2000+ Products
QualysGuard: Scanning
Scanning:
takes an “outside-in” and “inside-
in” approach to security, emulating
the attack route of a hacker
tests effectiveness of security
policy and controls by examining
network infrastructure for
vulnerabilities
Provides tools for untrusted and
authenticated scanning
D
Summary
Vulnerability Management & Infrastructure Provided by
QualysGuard Benefits: Qualys:
Gives you control and visibility NO Hardware & Software to Maintain
to manage your networks Auto Software and Signature Updates
Easy to Deploy and Manage from Any
security risks effectively and Web Browser
document compliance Integrated Ticketing System
automates most elements of 24/7 Support and Helpdesk
Vulnerability Management in
an efficient, cost-effective
manner
enables you to cut your
vulnerability management
expenses by 50-90% when
compared to traditional
enterprise-software VM
solutions
Q&A
Thank you!
edvinas.pranculis@synergy.lt
www.synergy.lt
www.qualys.com