Sca Datasheet
Sca Datasheet
Sca Datasheet
Key Features
Benefits
Broad Coverage Extensive Cloud Support
Leading CIS Benchmark coverage for operating Built for the cloud and integrated with leading
systems, databases, applications and network A B C cloud service providers
devices
Detailed Features
Augment your Qualys VM cloud service DEFINE: Define: First import assets found using VM scans and
use the authentication configuration from VM when scanning
for configuration issues with SCA. Then import the applicable
CIS policies into your subscription and customize the controls
Configuration assessment is an essential part of a comprehensive
per your security standards, all using Qualys SCA’s simple,
vulnerability management program. However, our competitors either
web-based UI.
combine lightweight vulnerability and configuration assessment, or
offer the functionalities in separate products that aren’t integrated. ASSESS: Scan your IT assets and map the asset to the right CIS
Qualys gives you the best of both worlds. Qualys Vulnerability policy.
Management (VM) continuously scans and identifies vulnerabilities
REPORT: Generate the report showing your control posture
with Six Sigma (99.99966%) accuracy, protecting IT assets on
against the CIS Benchmarks, Qualys-provided control criticality
premises, in the cloud and mobile endpoints. Qualys SCA, designed to
and remediation information, and the evidence for failure or
work natively with Qualys VM, can be added seamlessly to your passing, as well as the references to compliance standards. You
account with one click. Qualys SCA complements Qualys VM’s can activate and deactivate controls as necessary for reporting
capabilities for detecting IT asset flaws with capabilities for purposes.
assessment and reporting of configuration settings in 4 easy steps:
REMEDIATE: Remediate the failed controls, using Qualys-
provided control criticality and the control remediation
information.
Perform configuration Conduct remote scanning and Sharpen and simplify
assessments quickly and auto-discovery of assets configuration assessments
comprehensively With its benchmark-based guidance, simplified
SCA uses the same data collection technologies as
Improperly configured IT assets put your Qualys VM, allowing for agent or agentless data workflows for scanning and reporting, and cloud-
organization at an increased risk for breaches. collection, so that customers can comprehensively based deployment, Qualys SCA provides a variety
However, it’s common for organizations to rush detect and better safeguard global endpoints, on- of advantages over competing products, especially
systems into production with default settings and premises systems and cloud assets against today’s legacy point solutions installed on premises:
without basic hardening. Addressing these issues is evolving cyber threats. Qualys data collection tools
key for data protection, regulatory compliance, and and processes cover all your bases and include: Lower cost of ownership because as a cloud
secure digital transformation initiatives. service there’s no software to install or maintain.
Physical and virtual appliances that scan IT assets
Improved protection of hybrid IT environments
With Qualys SCA, you’ll be able to automatically located on-premises, in private clouds, or in
through the highly-scalable, extensible and
and continuously check that your IT assets -- on virtualized environments
centrally-managed Qualys Cloud Platform.
premises, in clouds and on mobile endpoints -- are
Cloud appliances that remotely scan your
configured securely according to CIS guidelines. Consistent maintenance of a standard configuration
infrastructure-as-a-service (IaaS) and platform-as-
This will give your organization a solid foundation throughout the enterprise via baseline
a-service (PaaS) instances in commercial cloud
not only for security but also for compliance with configuration standards that can be applied prior
computing platforms
most regulations like HIPAA and with industry to asset deployment.
mandates like PCI-DSS. Providing the industry’s Lightweight, all-purpose, self-updating cloud
Increased compliance and business effectiveness
widest coverage for CIS Benchmark technologies, agents that reside on the IT assets they
and efficiency, as well as stronger security posture.
continuously monitor, with minimal network impact
Qualys SCA assesses the configuration of elements
and no need for scan windows, credentials, nor Protection of the infrastructure and operations
such as:
firewall changes, with no need for the device to be underpinning your organization’s key digital
on-line during your scheduled scanning windows. transformation efforts.
Operating systems
Server software
Cloud providers
Network devices
Desktop software
All data analyzed in real time See the results in one place,
Qualys Cloud Platform provides an end-to-end solution, allowing anytime, anywhere
you to avoid the cost and complexities that come with managing
Qualys Cloud Platform is accessible directly in the browser, no
multiple security vendors. The Qualys Cloud Platform
plugins necessary. With an intuitive, single-pane-of-glass user
automatically gathers and analyzes security and compliance data
interface for all its apps, it lets you customize dashboards, drill down
in a scalable, state-of-the-art backend, and provisioning additional
into details, and generate reports for teammates and auditors.
cloud apps is as easy as checking a box.
AI Asset Inventory VM Vulnerability Management WAS Web App Scanning PC Policy Compliance
SYN CMDB Sync TP Threat Protection WAF Web App Firewall PCI PCI Compliance