Qualys VMDRQualys
|
||||||
Related Products
|
||||||
About
In use by thousands of security professionals across industries and governments, Celerium solutions are changing the way we manage cyber threats. As a community, we need to sift through the quagmire of data to find relevant intelligence. We need to use that intelligence proactively to defend our networks and organizations and make our communities safer. And we need to help each other prioritize the volume of activity to understand the hierarchy of threat actors. With Celerium’s Cyber Defense Network, private and public organizations are proactive about cyber defense, faster to respond to threats and smarter about their response. In order to defend against threats, we must first know what's important. Together we can identify important threats, automate our reaction to those threats and proactively keep our networks and industries safer. Celerium provides a variety of solutions that empower our customers to take a proactive, aggressive stance on cyber security.
|
About
The industry's most advanced, scalable and extensible solution for vulnerability management. Fully cloud-based, Qualys VMDR provides global visibility into where your IT assets are vulnerable and how to protect them. With VMDR 2.0, enterprises are empowered with visibility and insight into cyber risk exposure - making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. Security teams can take action to mitigate risk, helping the business measure its true risk, and track risk reduction over time. Discover, assess, prioritize, and patch critical vulnerabilities and reduce cybersecurity risk in real time and across your global hybrid IT, OT, and IoT landscape. Quantify risk across vulnerabilities, assets, and groups of assets to help your organization proactively mitigate risk exposure and track risk reduction over time with Qualys TruRisk™
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Security professionals looking for a solution to protect their infrastructure against data breaches and cyber threats
|
Audience
Anyone seeking a solution to continuously detect and protect against attacks, anytime, anywhere
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and VideosNo images available
|
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationCelerium
Founded: 2019
United States
www.celerium.com/solutions
|
Company InformationQualys
Founded: 1999
United States
www.qualys.com/apps/vulnerability-management-detection-response/
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
||||||
|
|
||||||
Categories |
Categories |
|||||
Vulnerability Management Features
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
|
||||||
Integrations
Armis Centrix
CardinalOps
Centraleyezer
Cisco Adaptive Security Appliance (ASA)
Cisco Meraki
CyCognito
HivePro Uni5
NorthStar Navigator
Notus
Proficio
|
Integrations
Armis Centrix
CardinalOps
Centraleyezer
Cisco Adaptive Security Appliance (ASA)
Cisco Meraki
CyCognito
HivePro Uni5
NorthStar Navigator
Notus
Proficio
|
|||||
|
|
|