Qualys, Inc. (NASDAQ: QLYS), a pioneer and leading provider of highly innovative cloud-based IT security and compliance solutions, has announced a new integration, born from the collaboration with Google Cloud, which provides the services of the Container Security solution to support Artifact Registry of Google Cloud, without the need for configuration.
This integration, already available on the market, allows DevOps and security managers to set up automated security scans of container objects in the Artifact Registry. Scans performed by Qualys Container Security will be able to evaluate all images for vulnerabilities and configuration errors and will compile a software inventory to provide a centralized view of the different Google Cloud environments. Customers will then be able to use Qualys' Container Image Security Posture API to automate workflow security flows, such as container deployment in Google Cloud Build or integration of DevOps ticketing systems.
"The Google Cloud Artifact Registry is a practical and fully managed service that allows customers to set up a central repository in which to register all their artifact software," he said. Philippe Courtot, President and CEO of Qualys"The Google Cloud Artifact Registry is a practical and fully managed service that allows customers to set up a central repository in which to register all their artifact software," he said.
"The Google Cloud Artifact Registry is a practical and fully managed service that allows customers to set up a central repository in which to register all their artifact software," he said. Juan Sebastian Oviedo, Product Manager di Google Cloud.
Qualys Container Security
Built on the Qualys Cloud Platform, Qualys Container Security discovers, tracks and protects containers from development to runtime. Container Security continuously reports and responds to security and compliance issues in containers across the hybrid IT environment. The implementation of runtime protection extends these capabilities and provides a complete and granular visibility during a container execution, allowing you to control and monitor the execution according to different rules. As a result, it is possible to recognize a deviation from the expected behavior that potentially creates a security risk due to a vulnerability or misconfiguration.