November 01, 2003
$5,995 for 10 IP addresses
- Ease of Use:
- Value for Money:
- Overall Rating:
Scalable and manageable across multi-site, multi-national intranets.
There is no option to install patches and fixes automatically when vulnerabilities are found.
An excellent solution to the problem of providing auditable automated vulnerability assessment that examines the vulnerabilities to internal as well as external threats.
Qualys has provided an automated remote vulnerability testing service for some time. However, a remotely operated service like that is limited in what it can do when it is trying to access your computers through a properly configured firewall. That is not to say it doesn't do a good job of showing up external vulnerabilities, but it can't give a complete vulnerability picture, as it lacks the 'enemy within' perspective. Incidentally, internal risks are not limited to dishonest or malicious employees - it could apply to an innocent user accidentally running a trojan attached to an email, because he is running it inside the firewall perimeter.
What is needed to complete a security audit is a vulnerability assessment carried out from inside the organisation on the corporate intranet to see what vulnerabilities are exposed to internal users who may be a threat. And that's exactly what QualysGuard Enterprise does with its Intranet Scanner option.
Intranet Scanner is an appliance that is installed on the internal network, but communicates with Qualys' remote vulnerability testing servers through the firewall. In this way, it receives up-to-date instructions on what tests to perform directly from Qualys in real time, but does not itself compromise existing security as it does not bypass the firewall. Also, all data traffic flowing between the appliance and Qualys' data center is encrypted using SSL. Effectively, you are putting a vulnerability sensor at a node within the internal network to be tested.
Being an appliance, the Intranet Scanner is easily installed. It needs a mains power supply and a 10/100Mbits/sec Ethernet connection to the internal network. All you need to configure from its front panel is whether or not to use DHCP and, if not using DHCP, a static IP address along with gateway and DNS IP addresses must be entered. If you install it behind a proxy server, you need to enable the SSL proxy option on the appliance. However, once an IP configuration has been established, there is no need to connect to it directly using a web browser. Rather, it immediately communicates with Qualys' data centre over the internet, and you log on to Qualys' web site to control it remotely via the QualysGuard web service.
Once installed, the first step is to allow its auto-discovery feature to find all the nodes on your internal network. This results in a graphical map showing how they are connected. The hostname and operating system are identified for each node, not just servers, but any device that can be identified - this includes routers, hubs, switches, wireless and VPN access points and other network infrastructure components.
The next step is to carry out a vulnerability scan. You can select which hosts to scan and schedule regular scans if you wish. Summary scan results can be emailed immediately on completion, so you can leave a scan in progress and do something else. The time taken to complete the scan depends on the number of hosts, but is not unduly long - it can scan a half-full Class C network in less than one hour. Once the scan is complete, you can view the results on the web. They give a full description of each vulnerability and the recommended solution.
Finally, you can download patches and other fixes easily at the click of a mouse simply by pointing at the indicated solution section of each vulnerability report and clicking. Most patches and updates are downloaded directly from the OS/application vendor's web site, but they are all verified by Qualys to ensure that they do indeed fix the vulnerability and that no other problems will be caused. However, you then have to install the downloaded patch manually - there is no option to install patches and fixes automatically.
The reporting engine is very good and provides an overview of the vulnerabilities, prioritized based on severity. Delegation is catered for by a simple hierarchy in which users can be given permissions limited to merely reading scan reports, simply being notified by email that a scan has completed, or given full privileges to configure, schedule and initiate scans. Additionally, remedy tickets can be generated automatically and progressed through the system to ensure that action is taken to fix vulnerabilities.
The real advantage of Qualys' solution is that the whole vulnerability assessment process can be automated in a scalable manner to go across a multi-site intranet. This scheduling of scans and delegation of responsibility is essential, as busy security managers do not have the time to run scans manually. Also, Qualys effectively provides a third-party audit - reports and logs that cannot be tampered with by the customer - and this will satisfy external security auditors.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry