Qualys company logo

The profile is currenly unclaimed by the seller. All information is provided by CB Insights.

qualys.com

Founded Year

1999

Stage

IPO | IPO

Total Raised

$56.4M

Date of IPO

9/30/2012

Market Cap

5.75B

Stock Price

149.74

Revenue

$0000 

About Qualys

Qualys is a provider of cloud security and compliance solutions that enable organizations to identify security risks to IT infrastructures, help protect IT systems and applications from cyber attacks and achieve compliance with internal policies and external regulations. The company's cloud solutions address the growing security and compliance complexities and risks that are amplified by the dissolving boundaries between internal and external IT infrastructures and web environments, the rapid adoption of cloud computing and the proliferation of geographically dispersed IT assets. Organizations can use Qualys' integrated suite of solutions delivered on QualysGuard Cloud Platform to cost-effectively obtain a unified view of their security and compliance posture across globally-distributed IT infrastructures.

Qualys Headquarter Location

919 E Hillsdale Blvd 4th Floor

Foster City, California, 94404,

United States

+1 800-745-4355

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Expert Collections containing Qualys

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Qualys is included in 2 Expert Collections, including Regtech.

R

Regtech

1,499 items

Technology that addresses regulatory challenges and facilitates the delivery of compliance requirements in FIs. Regulatory technology helps FIs and regulators address challenges ranging from traditional compliance and risk management to data reporting and transmission.

C

Cybersecurity

5,100 items

Qualys Patents

Qualys has filed 35 patents.

The 3 most popular patent topics include:

  • Computer security
  • Computer network security
  • Computer security exploits
patents chart

Application Date

Grant Date

Title

Related Topics

Status

7/19/2019

6/14/2022

Computer security, Hacking (computer security), Computer network security, Computer security exploits, Cybercrime

Grant

Application Date

7/19/2019

Grant Date

6/14/2022

Title

Related Topics

Computer security, Hacking (computer security), Computer network security, Computer security exploits, Cybercrime

Status

Grant

Latest Qualys News

The challenges of managing the modern external attack surface

Aug 10, 2022

The challenges of managing the modern external attack surface Qualys recently added External Attack Surface Management (EASM) capabilities to the Qualys Cloud Platform. In this interview for Help Net Security, Kunal Modasiya, VP of Product Management at Qualys, discusses how the new component, integrated into CyberSecurity Asset Management 2.0, adds the external attacker view to identify previously unknown internet-facing assets for a complete and accurate picture of the enterprise attack surface. What do the External Attack Surface Management (EASM) capabilities in the Qualys Cloud Platform bring to the table? Qualys’ External Attack Surface Management (EASM) capabilities are natively integrated into CyberSecurity Asset Management 2.0 . The new component adds the outside-in external attacker view to identify previously unknown internet-facing assets for a complete and accurate picture of the enterprise attack surface. Qualys EASM allows customers to continuously monitor and reduce the entire enterprise attack surface including internal and internet-facing assets and discover previously unidentified exposures. It helps synchronize with CMDBs, detect security gaps like unauthorized or end-of-support software, open ports, remotely exploitable vulnerabilities, digital certificate issues, unsanctioned apps and domains – and ultimately allows organizations to mitigate risk by taking the appropriate actions. What’s unique about the Qualys approach to EASM? In today’s tumultuous threat landscape, it is imperative for companies to move away from siloed and disparate point solutions, cut through the noise and better understand where their risks are and how to protect their blind spots. At a foundational level, Qualys’ vision mirrors this need and works to simplify cybersecurity for everyone – with one platform and one agent – to ultimately have one workflow that discovers all IT assets in an environment, reduces exposure windows through patching and uses all context gathered to monitor a system. EASM furthers this vision as an extension of Qualys CSAM – it supports and enhances the same great features as it does for internal and managed assets: Automatically categorize your assets and add your own context with dynamic, rule-based tagging Synchronize bidirectionally with your CMDB, keeping your CMDB up-to-date and enriching Qualys with business metadata such as owners, business application, and criticality Easily keep your compliance teams informed with out-of-box, customizable reporting Provide a 360-degree view of your assets, security, and compliance posture with Unified Dashboards Configure rule-based alerts to notify teams through their preferred notification channels As a result of its integration with the Qualys Cloud Platform, cybersecurity teams can easily transition from discovering unknowns to fully inventorying all aspects of these assets. Qualys places them into a proper security context, assesses them for vulnerabilities and misconfigurations, which allows customers to prioritize risks and rapidly remediate – all from a single, unified platform. What are the main benefits of Qualys CyberSecurity Asset Management 2.0 with EASM for enterprise users? Through the inclusion of External Attack Surface Management into Qualys CyberSecurity Asset Management 2.0, Qualys is tilting the playing field against attackers and giving added advantage to its customers. This new capability enables: Discovery: Automatically discover your assets exposed to the internet, including ones from your subsidiaries, mergers, and acquisitions Attribution: Understand asset attribution by showing how an asset is discoverable on the internet and how it’s associated to your organization Business context: Understand the context of each asset, including when and how it was created, by providing information such as DNS and WHOIS records Continuous risk assessment: Know asset configuration/misconfiguration, including unsanctioned open ports, unapproved services and application stacks, and expired or expiring SSL certificates; See potential vulnerabilities with automated lightweight scans and integration with sources like Shodan Real-time visibility: Gain visibility of previously unknown or unmanaged assets by correlating with your existing inventory within Qualys CSAM, to identify previously missing assets Risk mitigation: Activate and orchestrate Qualys full vulnerability scans through one-click automated workflow to confirm vulnerabilities on new assets, and then prioritize to rapidly remediate risk Overall, EASM greatly benefits organizations by allowing them to reduce the unnecessary attack surface – e.g., the threat from “unknown unknowns” – as much as possible. It meets the need of cybersecurity teams to continuously monitor their external attack surface, track changes and receive notifications when new, unknown assets or critical issues are found. How does EASM help IT security teams in their daily operations? Full asset visibility remains one of cybersecurity’s most elusive goals and a huge headache for many organizations, with attackers most often exploiting public-facing web assets that are poorly defended. In the era of the cloud, assets are highly dynamic and ephemeral, often difficult to detect using traditional scanning. This paired with the number of internet-facing devices and assets proliferating, has expanded the attack surface exponentially. EASM helps today’s organizations through its continuous process of discovering, classifying and assessing the security of all assets. It accurately maps the attack surface, and its effective protection – which ultimately mitigates the risk of a successful attack. EASM helps cybersecurity teams automatically associate and add context to assets related to their organization, no matter where the asset is hosted or by whom. It unveils if an attacker’s reconnaissance will find a path to their organization’s crown jewels before they know about it, and sheds light on exposure to certain vulnerabilities and risks from exploits, attack vectors, the ease/difficulty of exploitation and the remediation complexities to correct exposure. Daily Newsletter - E-mail sent every business day with a recap of the last 24 hours Weekly Newsletter - E-mail sent every Monday with a recap of the last 7 days (IN)SECURE Magazine - E-mail sent when a new issue is released

Qualys Web Traffic

Rank
Page Views per User (PVPU)
Page Views per Million (PVPM)
Reach per Million (RPM)
CBI Logo

Qualys Rank

  • When was Qualys founded?

    Qualys was founded in 1999.

  • Where is Qualys's headquarters?

    Qualys's headquarters is located at 919 E Hillsdale Blvd, Foster City.

  • What is Qualys's latest funding round?

    Qualys's latest funding round is IPO.

  • How much did Qualys raise?

    Qualys raised a total of $56.4M.

  • Who are the investors of Qualys?

    Investors of Qualys include Bessemer Venture Partners, VeriSign, Trident Capital, ABS Ventures and Upfront Ventures.

  • Who are Qualys's competitors?

    Competitors of Qualys include Nanitor, Veracode, Axonius, DeepSurface Security, Vicarius, PlexTrac, TrapX Security, HackerOne, Pentera, Sysdig and 45 more.

You May Also Like

Veracode Logo
Veracode

Veracode is an AppSec partner for creating secure software, reducing the risk of security breach, and increasing security and development teams’ productivity. As a result, companies using Veracode can move their business, and the world forward. With its combination of process automation, integrations, speed, and responsiveness, Veracode helps companies get accurate and reliable results to focus their efforts on fixing, not just finding, potential vulnerabilities.

Snyk Logo
Snyk

Snyk is an open-source security platform designed to help software-driven businesses enhance developer security. Snyk's dependency scanner finds, prioritizes, and fixes vulnerabilities and license violations in open source dependencies and container images.

Vulcan Cyber Logo
Vulcan Cyber

Vulcan Cyber is a Continuous Vulnerability Remediation solution that integrates, automates and orchestrates existing tools and processes, eliminating the most critical risks caused by vulnerabilities while at the same time avoiding any unexpected impact to business operations.

Detectify Logo
Detectify

Detectify offers a website vulnerability scanner that is in part powered by the crowd.

Cobalt Labs Logo
Cobalt Labs

Cobalt, previously known as CrowdCurity, is a SaaS-based marketplace enabling modern businesses to crowdsource application security by connecting them with a talented, vetted community of security researchers.

Bugcrowd Logo
Bugcrowd

Bugcrowd provides Crowdcontrol, which is used by companies to proactively uncover and resolve security bugs in their products - leveraging a vetted community of more than 27,000 security researchers. The company also provides a range of responsible disclosure and managed service options that allow companies to commission a customized security testing program that fits their specific requirements.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.