This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Qualys partners with Cyber-Ark to integrate identity management with scanning technology

Share this article:

Qualys has announced the integration of its QualysGuard technology with Cyber-Ark's Privileged Identity Management (PIM) Suite.

With this integration, users will be able to store and manage their credentials within their own networks using the Cyber-Ark Enterprise Password Vault. Cyber-Ark said that it will allow for better management of the administrator credentials in a collaborative environment, while providing QualysGuard the ability to more easily conduct trusted scans.

According to the companies, the joint solution protects access to company data, while expanding the coverage of the security scans, providing a more complete, accurate view of IT security and compliance.

Udi Mokady, president and CEO of Cyber-Ark, said: “Companies are increasingly turning toward the benefits of cloud computing solutions. The QualysGuard integration with Cyber-Ark's PIM Suite protects access to credentials data of IT systems, while allowing customers to scan their networks to get a comprehensive picture of their enterprise security and get the full benefits of a cloud-based service.”

Philippe Courtot, chairman and CEO of Qualys, said: “Trusted or authenticated scanning became the only practical way to have a comprehensive, up-to-date view of IT assets and to identify misconfigurations, missing patches and other security issues. This integration allows corporations to leverage Cyber-Ark's privileged identity management capabilities to run trusted scans, thus removing the obstacle of providing these credentials to Qualys.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Cybercrime-as-a-service the new criminal business model

Cybercrime-as-a-service the new criminal business model

A new report from Europol's European Cybercrime Centre (EC3) reveals that cybercrime is being increasingly commercialised, and by criminals who use legitimate services to hide their activities.

Facebook and WhatsApp rivals hit by DDoS attacks

Facebook and WhatsApp rivals hit by DDoS attacks

Two technology start-up companies which are seen as more secure alternatives to Facebook and WhatsApp were hit by distributed denial of service (DDoS) attacks over the weekend.

Apple now the most frequently phished brand in the world

Apple now the most frequently phished brand in ...

Phishing for Apples becomes a popular cyber-criminal sport