This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Qualys partners with Cyber-Ark to integrate identity management with scanning technology

Share this article:

Qualys has announced the integration of its QualysGuard technology with Cyber-Ark's Privileged Identity Management (PIM) Suite.

With this integration, users will be able to store and manage their credentials within their own networks using the Cyber-Ark Enterprise Password Vault. Cyber-Ark said that it will allow for better management of the administrator credentials in a collaborative environment, while providing QualysGuard the ability to more easily conduct trusted scans.

According to the companies, the joint solution protects access to company data, while expanding the coverage of the security scans, providing a more complete, accurate view of IT security and compliance.

Udi Mokady, president and CEO of Cyber-Ark, said: “Companies are increasingly turning toward the benefits of cloud computing solutions. The QualysGuard integration with Cyber-Ark's PIM Suite protects access to credentials data of IT systems, while allowing customers to scan their networks to get a comprehensive picture of their enterprise security and get the full benefits of a cloud-based service.”

Philippe Courtot, chairman and CEO of Qualys, said: “Trusted or authenticated scanning became the only practical way to have a comprehensive, up-to-date view of IT assets and to identify misconfigurations, missing patches and other security issues. This integration allows corporations to leverage Cyber-Ark's privileged identity management capabilities to run trusted scans, thus removing the obstacle of providing these credentials to Qualys.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Apple criticised despite fixing iOS 7 and OS X flaws

Apple criticised despite fixing iOS 7 and OS ...

Apple has been criticised despite correcting various security flaws on iOS 7 and OS X Lion and Mountain, with one such bug allowing hackers to intercept data via an SSL ...

Dual-pronged social media attack vector discovered

Dual-pronged social media attack vector discovered

Symantec researchers have spotted a dual-pronged social media engineering attack.

Major Twitter spam attack 'traced' to fellow social media site

Major Twitter spam attack 'traced' to fellow social ...

Photo-sharing website We Heart may have been hit by a stream hack, after it was cited as the source for thousands of spam messages being sent out on Twitter.