This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Qualys partners with Cyber-Ark to integrate identity management with scanning technology

Share this article:

Qualys has announced the integration of its QualysGuard technology with Cyber-Ark's Privileged Identity Management (PIM) Suite.

With this integration, users will be able to store and manage their credentials within their own networks using the Cyber-Ark Enterprise Password Vault. Cyber-Ark said that it will allow for better management of the administrator credentials in a collaborative environment, while providing QualysGuard the ability to more easily conduct trusted scans.

According to the companies, the joint solution protects access to company data, while expanding the coverage of the security scans, providing a more complete, accurate view of IT security and compliance.

Udi Mokady, president and CEO of Cyber-Ark, said: “Companies are increasingly turning toward the benefits of cloud computing solutions. The QualysGuard integration with Cyber-Ark's PIM Suite protects access to credentials data of IT systems, while allowing customers to scan their networks to get a comprehensive picture of their enterprise security and get the full benefits of a cloud-based service.”

Philippe Courtot, chairman and CEO of Qualys, said: “Trusted or authenticated scanning became the only practical way to have a comprehensive, up-to-date view of IT assets and to identify misconfigurations, missing patches and other security issues. This integration allows corporations to leverage Cyber-Ark's privileged identity management capabilities to run trusted scans, thus removing the obstacle of providing these credentials to Qualys.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Cyber security still a learning curve for most companies

Cyber security still a learning curve for most ...

Poor network visibility, outdated security tools, a skills shortage and a lack of control in the cloud are just some of the reasons companies are struggling with cyber-security, say two ...

WorldPay hacker sentenced to 11 years for role in £6 million scheme

WorldPay hacker sentenced to 11 years for role ...

An Estonian man, who helped hack payment processor RBS WorldPay in 2008, has now been sentenced to 11 years in prison for his involvement in the £5.9 (US$ 9.4 million) ...

'Sophisticated' Chinese hackers launched attacks against 43,000 computer systems

'Sophisticated' Chinese hackers launched attacks against 43,000 computer ...

A new report reveals that a Chinese cyber-espionage group is closely affiliated with government and carried out attacks against the likes of Fortune 500 companies and government agencies.