Q1. How will Qualys' recent acquisition of Adya benefit enterprise customers? When do you expect the integration of Adya's technology with Qualys' cloud platform to be completed?
As enterprises rapidly move to SaaS applications - GSuite, O365, Slack, etc. - to power their businesses, their IT teams are confronted with several problems related to managing and securing these cloud applications. First, each new app increases the workload on stressed IT teams to learn yet another tool, that they then have to manage. For example, a new employee joining the company will have to be given access to—or not—a whole host of services and, more importantly, cleanly de-provisioned from these services when they leave the organization. While employed at the org, they will have to be given access on an as needed basis. Rather than learning the native interfaces of all applications to perform these administrative tasks, IT would like to do this centrally - from one tool - and push out the policies once. This will help reduce errors and save time.
Second, as the number of tools grows and the company purchases these potentially expensive SaaS subscriptions—typically paid on a per-month basis—IT loses track of what licenses have been commissioned and which ones are actually being used - and see if there are ways to reclaim unused licenses and save costs.
Lastly, and most importantly, there are many ways by which data can get shared - maliciously or inadvertently - from these SaaS applications and IT has no idea on how critical data is being exposed. In one case, an ex-employee had shared all of the documents he owned with his personal Gmail address before leaving the company. At that same company, a consultant who had worked with the company more than two years previously still had access to over 100,000 documents. The IT team had no idea this was happening.
These are the problems for which Adya was built, and the problems Qualys hopes to help customers fix by incorporating Adya into its cloud platform. Adya provides a single console for IT admins to centrally manage their critical SaaS apps, manage SaaS licenses and secure their data no matter where it is. We expect to roll out the Adya technology as part of the Qualys Cloud Platform in Q3 2019.
Q2. How do you see enterprise demand for cloud services evolving over the next several years? What do you expect will be the biggest changes?
Enterprises are increasingly not just "cloud - first" but "cloud - only". Gartner estimates that, as of 2017, SaaS already accounted for more than 50% of the enterprise software spend and this trend will only increase. By some estimates, even mid-sized companies have more than 16 SaaS applications each. While the number of cloud services is increasing, the size of IT teams is either flat or reducing - so they are being asked to do more with less. Both of these trends - the increase of cloud applications and the decrease in the size of IT teams - will continue into the future. The distributed nature of cloud applications adds a higher burden on IT to secure data and monitor activity even when the applications are no longer on premises.
In this environment, IT requires all the help they can get to efficiently administer, manage costs and secure their burgeoning cloud applications environment.
Q3. What are Qualys' plans at Black Hat Asia 2019?
This year at Black Hat Asia, Qualys will be focused on showcasing to attendees the benefits of a single-pane view of security and compliance across all of infrastructure —including on-premises assets, clouds, containers, remote workforces, applications, APIs, and soon mobile devices— which organizations are adopting as they embark on Digital Transformation. We encourage attendees to come to our booth and see demos of solutions which provide visibility and control for monitoring, compliance and protection across the entire application lifecycle regardless of how they are built and bundled, as well as for the different infrastructure stacks on which they are deployed.
Qualys presence at Black Hat Asia ensures that enterprises have the opportunity to understand that don't have to compromise visibility and protection while adopting these new paradigms by providing solutions that are native to them, and which deliver visibility, accuracy, scale, immediacy and transparent orchestration of security.