Qualys - Software Composition Analysis (SwCA) Overview

This document provides an overview of the Qualys Software Composition Analysis feature.

Qualys Software Composition Analysis (SwCA) provides real-time visibility into the open-source software (OSS) and commercial libraries embedded within your applications. Qualys SwCA leverages the Qualys Cloud Agent to scan Windows and Linux assets for programming language-based packages and detects vulnerabilities like Log4j or OpenSSL. The Qualys Cloud Agent goes beyond the limitations of traditional package managers (like yum or apt) and can detect libraries manually dropped onto a system or nested within other packages. Qualys SwCA provides administrators with a comprehensive view to monitor and remediate supply chain risks.

The output of Qualys SwCA can be viewed in both the Qualys Cloud Agent module for a single host or within the Qualys Global Asset View across all hosts. Samples of the Qualys SwCA can be seen in the screenshots below.

From Qualys Cloud Agent -> Software Component tab:

list of sofware components from Qualys Cloud Agent

From Qualys Global Asset View:

Qualys Global Asset View with component filter applied and list of componenets

FAQ

  • What operating system is this supported on?
    • This is currently supported for Windows and Linux Cloud Agents
  • What languages are supported?
  • How can I filter for/out vulnerability detection from Qualys SwCA?
    • The query below will allow you to filter for only Qualys SwCA vulnerability findings and appending a "not" will remove all Qualys SwCA vulnerability findings.
      vulnerabilities.vulnerability.category:`SCA` 
  • My Qualys console does not show any software components. What should I do?
    • Contact the Office of Cybersecurity at cybersecurity@cio.wics.edu and a Qualys tools administrator will review your Qualys Cloud Agent configurations.


Keywords:
qualys swca software composition analysis sca overview 
Doc ID:
160372
Owned by:
Jennifer K. in Cybersecurity Testing and Cyber Defense
Created:
2026-03-31
Updated:
2026-04-01
Sites:
Cybersecurity Testing and Cyber Defense, Cybersecurity Vulnerablity Management, Office of Cybersecurity