Device Security
Integrate Device Security with Qualys Enterprise TruRisk
Table of Contents
                    
          Expand All
          |
          Collapse All
        
        Device Security Docs
Integrate Device Security with Qualys Enterprise TruRisk
Integrate Device Security through Cortex XSOAR with Qualys.
    | Where Can I Use This? | What Do I Need? | 
|---|---|
| 
 | One of the following subscriptions: 
 
                                    One of the following Cortex XSOAR setups:
                                 
 | 
Device Security can integrate with Qualys Enterprise TruRisk Vulnerability Management, Detection & Response
      to perform vulnerability scans. When you initiate
a vulnerability scan of a particular IoT device from the Device Security
portal, the command is securely sent from the Device Security through
Cortex XSOAR to the Qualys Cloud API over HTTPS. The Qualys Cloud
forwards the command to the specified scanner, which performs its
scan and sends back the results. Qualys creates a report with the
data it received, generates a PDF, and sends it back through Cortex XSOAR
to Device Security. Device Security updates the vulnerability information
and risk score for the scanned device and displays a link to the
report on its Device Details page and on
the Vulnerability Scan Reports page.
       
                
            Qualys
vulnerability scans complement the passive monitoring that Device Security
performs on network traffic by uncovering vulnerabilities on scanned
devices. Device Security incorporates the scan results such as CVEs
    into its ongoing risk score assessments.
    
        Integrating with Qualys Enterprise TruRisk Vulnerability Management, Detection & Response requires either a
            full-featured Cortex XSOAR™ server
            or the
            activation of a Device Security
            free
            cohosted Cortex XSOAR instance.
        
    