What Is It?
Qualys is a cloud-based vulnerability scanner and threat detector which comes with the ability to run IP based targeted scans or install a lightweight agent on endpoints for continuous monitoring. Qualys not only discovers threats and vulnerabilities but offers known effective ways to solve these threats. On top of this, Qualys provides asset management and tagging to allow for a unit to sort through their assets based on any number of tags, such as OS, software, data classification, criticality of system, VIP status, location, or any other custom tag.
Other Service Names
Qualys
Features
On Demand or Scheduled IP based scanning
Chose a single IP or range of IPs to get in depth scans of a device’s vulnerabilities. Filter these with reports to get the data that matters most to you. Each Qualys report also contains recommendations for how to handle detected threats.
Expert articles on new and emerging threats
Qualys Threat Protect provides you with articles written by experts at Qualys describing new vulnerabilities as they appear. This module also displays how many of your assets are susceptible to this new threat.
Always know what is happening with remote and VIP Devices with Cloud Agent
Qualys Cloud Agent is a lightweight background program that, once installed on an endpoint, send up to the moment data about what threats are found on the device, what software is installed, what ports are open, and the physical location of the endpoint.
Tag and manage your Assets
Qualys comes with a module to tag and organize assets as they are scanned. This allows you to quickly see what assets you have in your domain, as well as sort them based on tags like if they store Private Health Information, if the device is a workstation, or even what vulnerabilities have been detected. With this simple yet powerful tool, its easy to organize and manage even thousands of endpoints.
Requirements
Qualys is available for IT Professionals at the university. Since Qualys is a cloud-based service, anyone can access and use Qualys no matter the operating system or browser they choose to use.
Who Is Eligible To Use It?
Where Can I Get It?
Select the Request Network Vulnerability Scan button located on this page.
How Do I Use It?
Once you are signed up, simply visit qualys.uic.edu to get started.
How Much Does It Cost?
This service is funded by the University; there are no direct costs to clients.
How Can I Get Support?
If you are experiencing a problem with this service, please report it. If you just have a question, feel free to ask us.
Service Levels
Service Request Fulfillment Time |
3 business days, unless in-person training/discussion is required |
Incident Resolution Time |
3 business days |
Service Availability |
24x7 |
Maintenance Window(s) |
Approved Technology Solutions maintenance window(s) |
Service Notification Channel(s) |
IT Service Notices |