Help Center for Oracle Cloud

Document created by Hari Srinivasan on Feb 12, 2019Last modified by Alex Mandernack on Apr 27, 2019
Version 3Show Document
  • View in full screen mode


Here's where you'll find everything you need to know on using Qualys in securing Oracle Cloud Infrastructure.


Organizations that deploy workloads in the cloud must expand their security practices to that infrastructure as part of a shared security responsibility model. Qualys for Oracle Cloud Infrastructure simplifies deploying Vulnerability Management, Threat Protection, Web Application Scanning and Policy Compliance to those workloads. By utilizing Qualys sensors, users can gain a hackers-eye view of their perimeter combined with internal network scanning to create continuous visibility security of their workloads.


Tell me about my options

Users can now scan their Oracle Cloud Infrastructure instances along with all other global elastic cloud and on-premises assets from within the Qualys Cloud Platform. Qualys provides a suite of different solutions for extending the use of the Qualys Cloud Platform to Oracle Cloud Infrastructure.


Oracle Cloud Infrastructure supports two Cloud formats, the older Oracle Classic and the newer or (Nextgen) Oracle Compute Infrastructure (OCI). Qualys supports both of these Cloud types.


Sensor Support:

Qualys Scanner Appliances

Qualys Cloud Agent


Oracle Cloud Marketplace


Qualys Cloud Agents

  • Deploy the agents directly on Oracle instances
  • Bake Qualys Cloud Agents in to the image during the image creation process ( Learn more - Creating custom images)



If you are new to Qualys, sign up for a 30-day trial account. Once the account is created successfully, you should receive an e-mail with details about the trial. For existing users - log into your portal or upgrade your subscription to use the modules.  Get started with deploying the Scanner Appliance or the Cloud Agents to start securing your Alibaba Cloud infrastructure.

Learn more

New User? Sign up for a trial

Cloud Agent Getting Started Guide (pdf)

IT Security Discussions (includes Vulnerability Management)

Compliance Discussions

Qualys Documentation