Nothing Special   »   [go: up one dir, main page]

0% found this document useful (0 votes)
24 views4 pages

Sca Datasheet

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 4

Security Configuration Assessment

Automate configuration assessment


of global IT assets.

Comprehensive vulnerability management


requires continuous configuration
assessment, because hackers constantly
try to exploit weak configuration settings.
To help ensure your systems are properly
hardened, Qualys developed Security
Configuration Assessment (SCA).
A Qualys Vulnerability Management (VM) add-on, Qualys SCA
lets you expand your VM program with automatic assessment
of IT assets’ configurations. Using the latest Center for Internet
Security (CIS) Benchmarks, Qualys SCA provides intuitive and
easy workflows for assessing, monitoring, reporting and
remediating security-related configuration issues. Built on the
world’s leading cloud-based security and compliance platform,
Qualys SCA lets you ensure the consistency, integrity and
strength of your IT assets’ configurations without the
deployment cost and complexity of legacy configuration
management products.

Key Features

Broad coverage Accountability for controls


Qualys SCA is an add-on for Qualys Vulnerability Management that Qualys SCA controls are developed and validated in-house by Qualys
lets you assess, report, monitor and remediate security-related security experts and certified by CIS. The controls are optimized for
configuration issues based on the Center for Internet Security (CIS) performance, scalability, and accuracy. Qualys SCA can be used in IT
Benchmarks. It supports the latest out-of-the-box CIS benchmark environments of any size, from small ones to the largest.
releases of operating systems, databases, applications and network
devices..

Ease of use Reports and dashboards


SCA’s CIS assessments are provided via a web-based user interface SCA users can schedule assessments, automatically create
and delivered from the Qualys Cloud Platform, enabling centralized downloadable reports of configuration issues, and view dashboards
management with minimal deployment overhead. CIS controls can be for improving their security posture. This brings full circle Qualys
selected and customized according to an organization’s security SCA’s automation of security best practices behind leading
policies. This eliminates the cost, resource and deployment issues benchmarks, and lets InfoSec teams take a proactive approach
associated with traditional software point products for configuration towards digital business security.
management.
Qualys SCA is a cloud
solution for expanding
VM programs with “ Both vulnerability assessment and

configuration scanning and


security control assessment capabilities
are critical because many regulations
simplified workflows to prescribe technical control assessments

address configuration (which drives SCA) and also explicitly

issues. Its capabilities are


prescribe vulnerability assessments.”

powered by the Qualys Anton Chuvakin


Cloud Platform. Research Vice President &
Distinguished Analyst, Gartner

Benefits
Broad Coverage Extensive Cloud Support
Leading CIS Benchmark coverage for operating Built for the cloud and integrated with leading
systems, databases, applications and network A B C cloud service providers
devices

Ease of Use Powerful Reports and Dashboards


Centrally managed assessment with minimal Automatic assessment scheduling and report
deployment overhead and the scalability of the generation
Qualys Cloud Platform

Flexible Deployment Native Integration with other Qualys Apps


Agent-based or remote scanning Integration with Qualys Asset Inventory and Qualys
VM lets you quickly identify targets, manage
authentication, and find results

Detailed Features
Augment your Qualys VM cloud service DEFINE: Define: First import assets found using VM scans and
use the authentication configuration from VM when scanning
for configuration issues with SCA. Then import the applicable
CIS policies into your subscription and customize the controls
Configuration assessment is an essential part of a comprehensive
per your security standards, all using Qualys SCA’s simple,
vulnerability management program. However, our competitors either
web-based UI.
combine lightweight vulnerability and configuration assessment, or
offer the functionalities in separate products that aren’t integrated. ASSESS: Scan your IT assets and map the asset to the right CIS
Qualys gives you the best of both worlds. Qualys Vulnerability policy.
Management (VM) continuously scans and identifies vulnerabilities
REPORT: Generate the report showing your control posture
with Six Sigma (99.99966%) accuracy, protecting IT assets on
against the CIS Benchmarks, Qualys-provided control criticality
premises, in the cloud and mobile endpoints. Qualys SCA, designed to
and remediation information, and the evidence for failure or
work natively with Qualys VM, can be added seamlessly to your passing, as well as the references to compliance standards. You
account with one click. Qualys SCA complements Qualys VM’s can activate and deactivate controls as necessary for reporting
capabilities for detecting IT asset flaws with capabilities for purposes.
assessment and reporting of configuration settings in 4 easy steps:
REMEDIATE: Remediate the failed controls, using Qualys-
provided control criticality and the control remediation
information.
Perform configuration Conduct remote scanning and Sharpen and simplify
assessments quickly and auto-discovery of assets configuration assessments
comprehensively With its benchmark-based guidance, simplified
SCA uses the same data collection technologies as
Improperly configured IT assets put your Qualys VM, allowing for agent or agentless data workflows for scanning and reporting, and cloud-
organization at an increased risk for breaches. collection, so that customers can comprehensively based deployment, Qualys SCA provides a variety
However, it’s common for organizations to rush detect and better safeguard global endpoints, on- of advantages over competing products, especially
systems into production with default settings and premises systems and cloud assets against today’s legacy point solutions installed on premises:
without basic hardening. Addressing these issues is evolving cyber threats. Qualys data collection tools
key for data protection, regulatory compliance, and and processes cover all your bases and include: Lower cost of ownership because as a cloud
secure digital transformation initiatives. service there’s no software to install or maintain.
Physical and virtual appliances that scan IT assets
Improved protection of hybrid IT environments
With Qualys SCA, you’ll be able to automatically located on-premises, in private clouds, or in
through the highly-scalable, extensible and
and continuously check that your IT assets -- on virtualized environments
centrally-managed Qualys Cloud Platform.
premises, in clouds and on mobile endpoints -- are
Cloud appliances that remotely scan your
configured securely according to CIS guidelines. Consistent maintenance of a standard configuration
infrastructure-as-a-service (IaaS) and platform-as-
This will give your organization a solid foundation throughout the enterprise via baseline
a-service (PaaS) instances in commercial cloud
not only for security but also for compliance with configuration standards that can be applied prior
computing platforms
most regulations like HIPAA and with industry to asset deployment.
mandates like PCI-DSS. Providing the industry’s Lightweight, all-purpose, self-updating cloud
Increased compliance and business effectiveness
widest coverage for CIS Benchmark technologies, agents that reside on the IT assets they
and efficiency, as well as stronger security posture.
continuously monitor, with minimal network impact
Qualys SCA assesses the configuration of elements
and no need for scan windows, credentials, nor Protection of the infrastructure and operations
such as:
firewall changes, with no need for the device to be underpinning your organization’s key digital
on-line during your scheduled scanning windows. transformation efforts.
Operating systems

Server software

Cloud providers

Network devices

Desktop software

Leverage the knowledge of


industry experts
Qualys SCA operationalizes the non-profit Center
for Internet Security’s (CIS) Benchmarks by
supporting them out of the box and automating the
assessment of critical configuration settings on
your IT assets against these guidelines.

The CIS Benchmarks , applicable to over 100


technologies and platforms, are unbiased and not
motivated by profit considerations, and created via
consensus by a community of international
cybersecurity experts, including experts from
Qualys.
Powered by the Qualys Cloud Platform
– the revolutionary architecture that powers
Qualys’ IT security and compliance cloud apps

Sensors that provide continous visibility Respond to threats immediately


On-premises, at endpoints or in the cloud, the Qualys Cloud With Qualys’ Cloud Agent technology, there’s no need to
Platform sensors are always on, giving you continuous 2-second schedule scan windows or manage credentials for scanning.
visibility of all your IT assets. Remotely deployable, centrally And Qualys Continuous Monitoring service lets you proactively
managed and self-updating, the sensors come as physical or address potential threats whenever new vulnerabilities appear,
virtual appliances, or lightweight agents. with real-time alerts to notify you immediately.

All data analyzed in real time See the results in one place,
Qualys Cloud Platform provides an end-to-end solution, allowing anytime, anywhere
you to avoid the cost and complexities that come with managing
Qualys Cloud Platform is accessible directly in the browser, no
multiple security vendors. The Qualys Cloud Platform
plugins necessary. With an intuitive, single-pane-of-glass user
automatically gathers and analyzes security and compliance data
interface for all its apps, it lets you customize dashboards, drill down
in a scalable, state-of-the-art backend, and provisioning additional
into details, and generate reports for teammates and auditors.
cloud apps is as easy as checking a box.

Cloud Platform Apps


Qualys apps are fully integrated and natively share the data they collect for real-time
analysis and correlation. Provisioning another app is as easy as checking a box.

ASSET MANAGEMENT IT SECURITY WEB APP SECURITY COMPLIANCE MONITORING

AI Asset Inventory VM Vulnerability Management WAS Web App Scanning PC Policy Compliance

SYN CMDB Sync TP Threat Protection WAF Web App Firewall PCI PCI Compliance

CM Continuous Monitoring FIM File Integrity Monitoring

IOC Indication of Compromise SCA Security Configuration


Assessment
CS Container Security
CSA Cloud Security Assessment

SAQ Security Assessment


Questionnaire

Request a full trial (unlimited-scope) at


qualys.com/trial
Qualys is easy to implement, easy to use, fully scalable –
and require NO infrastructure or software to maintain.

© 2017 Qualys, Inc. All rights reserved. 9/17

You might also like