This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Qualys partners with Cyber-Ark to integrate identity management with scanning technology

Share this article:

Qualys has announced the integration of its QualysGuard technology with Cyber-Ark's Privileged Identity Management (PIM) Suite.

With this integration, users will be able to store and manage their credentials within their own networks using the Cyber-Ark Enterprise Password Vault. Cyber-Ark said that it will allow for better management of the administrator credentials in a collaborative environment, while providing QualysGuard the ability to more easily conduct trusted scans.

According to the companies, the joint solution protects access to company data, while expanding the coverage of the security scans, providing a more complete, accurate view of IT security and compliance.

Udi Mokady, president and CEO of Cyber-Ark, said: “Companies are increasingly turning toward the benefits of cloud computing solutions. The QualysGuard integration with Cyber-Ark's PIM Suite protects access to credentials data of IT systems, while allowing customers to scan their networks to get a comprehensive picture of their enterprise security and get the full benefits of a cloud-based service.”

Philippe Courtot, chairman and CEO of Qualys, said: “Trusted or authenticated scanning became the only practical way to have a comprehensive, up-to-date view of IT assets and to identify misconfigurations, missing patches and other security issues. This integration allows corporations to leverage Cyber-Ark's privileged identity management capabilities to run trusted scans, thus removing the obstacle of providing these credentials to Qualys.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

1 in 5 corporate networks host child sex abuse content

1 in 5 corporate networks host child sex ...

One in five companies have someone who has downloaded child sex abuse images at work. But in just 3.5 per cent of cases this has led to a criminal investigation ...

UK's Racing Post leaks 677,000 customer names and passwords

UK's Racing Post leaks 677,000 customer names and ...

SQL injection to blame for Racing Post incursion

NSA has 850 billion pieces of searchable metadata

NSA has 850 billion pieces of searchable metadata

The National Security Agency (NSA) is reported to have developed its own search engine to sift through the billions of phone calls, emails and other electronic communications it harvests and ...