This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Qualys partners with Cyber-Ark to integrate identity management with scanning technology

Share this article:

Qualys has announced the integration of its QualysGuard technology with Cyber-Ark's Privileged Identity Management (PIM) Suite.

With this integration, users will be able to store and manage their credentials within their own networks using the Cyber-Ark Enterprise Password Vault. Cyber-Ark said that it will allow for better management of the administrator credentials in a collaborative environment, while providing QualysGuard the ability to more easily conduct trusted scans.

According to the companies, the joint solution protects access to company data, while expanding the coverage of the security scans, providing a more complete, accurate view of IT security and compliance.

Udi Mokady, president and CEO of Cyber-Ark, said: “Companies are increasingly turning toward the benefits of cloud computing solutions. The QualysGuard integration with Cyber-Ark's PIM Suite protects access to credentials data of IT systems, while allowing customers to scan their networks to get a comprehensive picture of their enterprise security and get the full benefits of a cloud-based service.”

Philippe Courtot, chairman and CEO of Qualys, said: “Trusted or authenticated scanning became the only practical way to have a comprehensive, up-to-date view of IT assets and to identify misconfigurations, missing patches and other security issues. This integration allows corporations to leverage Cyber-Ark's privileged identity management capabilities to run trusted scans, thus removing the obstacle of providing these credentials to Qualys.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

NCA wants security pros to become cybercrime fighters

NCA wants security pros to become cybercrime fighters

The UK's National Crime Agency is on the hunt for cyber security professionals to "join the fight against some of the world's most significant cyber criminals" on salaries ranging from ...

GCHQ head says agency was 'never involved in mass surveillance'

GCHQ head says agency was 'never involved in ...

Sir Iain Lobban says GCHQ staff "are normal decent human beings who watch EastEnders and Spooks".

Apple Mac OS criticised for sending search results to third parties

Apple Mac OS criticised for sending search results ...

Apple is under pressure to make changes to the Spotlight feature on the new Mac OS X Yosemite 10.10, which tracks location and sends data back to the firm and ...