Networking

09:30 AM
Connect Directly
RSS
E-Mail
50%
50%

Qualys Integrates With Cyber Ark For Secure Credential Management

Qualys is integrating its network vulnerability scanning and risk management software with Cyber-Ark Software to securely store passes used to look deeper inside networks to find and fix vulnerabilities. Companies can store and manage credentials required by the vulnerability and compliance scans in the Cyber-Ark Enterprise Password Vault (EPV). This makes the QualysGuard scan more effective because it can see and do more on the client network with better access to the PIM without revealing PIM

Qualys is integrating its network vulnerability scanning and risk management software with Cyber-Ark Software to securely store passes used to look deeper inside networks to find and fix vulnerabilities. Companies can store and manage credentials required by the vulnerability and compliance scans in the Cyber-Ark Enterprise Password Vault (EPV). This makes the QualysGuard scan more effective because it can see and do more on the client network with better access to the PIM without revealing PIM information outside the network.  

With QualysGuard alone, delivered as a SaaS, there would be security risks, but giving Qualys access to the passwords within Cyber-Ark ensures security. Privileged credentials are not only securely protected, but also periodically changed to meet corporate security policies and comply with regulations.

The integration with Cyber-Ark makes the scanning process more useful and effective, said Charles Kolodgy, research vice president for secure products at IDC. "If you don't have credentials you can't do a deep scan of the machine. For many vulnerability assessments you want to be able to look at components of the machine that are only available if you have access to the machine," Kolodgy said. "It is a nice way to manage these credentials so, in addition to the benefits from the scanning, the organization will also have the opportunity to improve the management of such device rights."

IBM has recently begun offering a hosted vulnerability assessment tool, which would put it in competition with Qualys, said Scott Crawford, research director at the research firm Enterprise Management Associates. However, Qualys has the first-to-market advantage in this space.

Offering authenticated scanning with Qualys and Cyber-Ark is the best way to deliver a comprehensive view of a customer's IT assets in order to identify misconfigurations, missing patches and other security issues, added Philippe Courtot, chairman and CEO for Qualys. A version of QualysGuard integrated  with Cyber-Ark is available now in production, said Perradeau. Pricing specifics were not immediately available.

Comment  | 
Print  | 
More Insights
Slideshows
Cartoon
Audio Interviews
Archived Audio Interviews
Jeremy Schulman, founder of Schprockits, a network automation startup operating in stealth mode, joins us to explore whether networking professionals all need to learn programming in order to remain employed.
White Papers
Register for Network Computing Newsletters
Current Issue
2014 Private Cloud Survey
2014 Private Cloud Survey
Respondents are on a roll: 53% brought their private clouds from concept to production in less than one year, and 60% extend their clouds across multiple datacenters. But expertise is scarce, with 51% saying acquiring skilled employees is a roadblock.
Video
Twitter Feed