Best vulnerability management solution

Share this article:
Best vulnerability management solution
Best vulnerability management solution

Winner: Qualys for QualysGuard

www.qualys.com

QualysGuard provides an easy to deploy and comprehensive way to reduce security risk and meet regulatory compliance needs. All a company needs is a web browser to scan its network and applications in order to spot and fix vulnerabilities and collect compliance data. Delivered via a software-as-a-service (SaaS) architecture, the cost of QualysGuard is on average 50 to 90 percent less than traditional software scanning solutions. With QualysGuard, organizations can effectively manage their vulnerabilities and maintain control over their network security with centralized reports, verified remedies and full remediation workflow capabilities with trouble tickets. QualysGuard provides comprehensive reports on vulnerabilities and compliance issues for systems and applications, including severity levels, time-to-fix estimates and impact on business, plus trend analysis on security and compliance issues. One of its largest vulnerability management deployments is at a Fortune Global 50 company scanning more than 700,000 devices globally.

With the SaaS approach, Qualys has simplified the process of vulnerability and compliance scanning. When implementing QualysGuard, there is no infrastructure to deploy or manage. The SaaS model not only saves time and resources, but also allows managers and auditors to get a continuous view of a company's security and compliance posture. In 2009, Qualys added customer web application scanning to the QualysGuard suite allowing customers to scan for SQL injections and XSS vulnerabilities to protect their web applications against these popular attacked vectors. Also, Qualys, in partnership with VeriSign iDefense, brought immediate defenses against zero-day threats and vulnerabilities and expanded reporting capabilities, which allow for prioritized patching and real-time risk analysis. The Qualys Vulnerability Lab maintains one of the industry's largest vulnerability databases with more than 7,000 unique checks based on CVE standards. Automated signature-regression testing ensures quality security audits and daily updates for customers.

Creating an automated process to continuously monitor network and web application security and to identify vulnerabilities is critical to protecting the enterprise and maintaining regulatory compliance.

Finalists 2010

  • Core Security Technologies for CORE IMPACT Pro
  • eEye Digital Security for Retina Network Security Scanner
  • Microsoft Corp. for Forefront Threat Management Gateway
  • Qualys for QualysGuard
  • Tenable Network Security for Tenable Security Center 3.4 with Nessus 4.0, Log Correlation Engine (LCE) 3.2 and Passive Vulnerability Scanner (PVS) 3.0
  • TippingPoint Technologies for TippingPoint Intrusion Prevention System (IPS)

Share this article:

Sign up to our newsletters