Qualys Cloud Platform

Cloud Security Solutions | Qualys

About

The solution monitors the vulnerability management process, tracks remediation, and ensures compliance with regulatory policies.

Features

Access Controls/Permissions
Access Management
Activity Dashboard
Activity Tracking
Alerts/Notifications
Anomaly and Malware Detection
Antivirus
API
Application Security
Approval Process Control
Archiving and Retention
Asset Detection
Audit Management
Audit trail
Authentication
Automatic Device Discovery
Autoresponders
Barcode/Ticket Scanning
Behavior Analysis
Canned Responses
Capacity Analysis
Certificate
Change Management
Compliance Management
Compliance Tracking
Configuration Management
Contact Management
Container Analysis
Container Isolation
Content Filtering
Continuous Integration
Continuous monitoring
Contract/License Management
Cost Tracking
Crawling Website Creation
Customizable templates
Customization
Dashboard
Data Recovery
Data Security
Data Visualization
Document Management
email marketing
Email Tracking
Endpoint Management
Equipment protection software
File Integrity Monitoring
Firewall
For DevSecOps
Forecasting
Incident Management
Intrusion Prevention System
Inventory Management
IT Resource Management
Kitting
License Management
Log Management
Maintenance Management
Monitoring
Network monitoring
Network Security
Next generation firewall
Order Management
Password Management
Patch Management
Patch prioritization
PCI Assessment
Policy Management
Policy Metadata Management
Preventive and corrective action software
Prioritization
Purchasing Management
Real-Time Monitoring
Relationship Mapping
Release Management
Remediation Management
Remote Access and Control
Remote Update/Installation
Renewal Management
Reporting and analysis
Reporting and statistics
Risk Alerts
Risk Analysis
Risk Assessment
Risk Management
Runtime Container Security
Scheduling
Search/Filter
Security Logs events
Server Tracking
Service Agreement Management
Shadow Computing Detection
Shared Inboxes
Signature Management
Single Sign-On
Spam Blocker
Spend Management
Subscription Management
Support Ticket Management
Third-Party Integrations
Threat intelligence
Threat Response
Training Management
Usage Tracking and Analysis
Vendor Management
VPN
Vulnerability Analysis
Vulnerability Assessment
Vulnerability/Threat Prioritization
Warehouse Management
Whitelist and blacklist

Looking for another solution?

Use our smart search engine to find the perfect tool for your needs.

Find my ideal tool