Qualys

Displaying 1-40 of 64 results

  • White Papers // Jan 2014

    Adding Zero-Day Offense to Vulnerability Management

    This paper describes why your organization is vulnerable to zero day attacks and what you can do to add a zero-day offense to existing vulnerability management processes. It also describes how the Qualys Zero-Day Risk Analyzer enhances capabilities of the QualysGuard Cloud Platform with targeted intelligence and workflow to...

    Sponsored By Qualys

  • White Papers // Jan 2014

    Discovering Vulnerable Web Applications

    This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization's overall vulnerability management

    Sponsored By Qualys

  • White Papers // Oct 2013

    Keep your PCs safe while surfing the Web

    Regardless of platform, the Web has become a hub of information and productivity. The browser has evolved to become one of the most-­used applications, which has drawn the attention of cyber criminals—making it a potential Achilles heel for security. Read more...

    Provided By Qualys

  • White Papers // Oct 2013

    Best Practices for Selecting a Vulnerability Management (VM) Solution

    With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether they are vulnerable to attack, find...

    Provided By Qualys

  • White Papers // Oct 2013

    Patch Acceleration for Stronger Security

    Patching is about fixing flawed software, and fast patching has become one of the recognized efficient mechanisms to improve your systems’ security and robustness to attacks. This paper describes an approach to patching that can efficiently accelerate the speed with which you apply patches. As part of a patching system,...

    Provided By Qualys

  • Case Studies // Jul 2011

    Astelit Dials Into a New, Powerful Vulnerability Management Service

    Astelit, the Ukrainian GSM operator, is widely known for its life brand that serves 8.7 million contract and prepaid subscribers. Astelit was relying on open source vulnerability scanners to conduct periodic assessments. While the systems were maintained securely, there was no repeatable vulnerability management process. Astelit needed a more effective,...

    Provided By Qualys

  • Case Studies // Mar 2011

    Tata Communications Helps Customers Proactively Mitigate it Risk

    Tata Communications Limited may be best known for providing innovative voice and communication services within more than 200 countries, the company has expanded far beyond those roots. They sought a vulnerability management solution that would enable it to build and offer a diverse set of vulnerability management services. Tata Communications...

    Provided By Qualys

  • Case Studies // Jun 2010

    Etisalat Secures Growth

    Etisalat provides an array of communication services from phone to mobile, broadband, and cable television to specialized e-Government offerings, traditional e-mail, hosting, and Domain Name System (DNS) management services. They need to build an automated risk management program that could scale with Etisalat's rapid growth. Etisalat selected QualysGuard from Qualys...

    Provided By Qualys

  • Webcasts // Jan 2010

    Fast Track: Planning & Deploying an Effective Vulnerability Management Program

    Speaker: Jonathan Bitle, Qualys This webcast covers the essential components of a successful Vulnerability Management program that allows you proactively identify risk to protect your network and critical business assets. Key take-aways: Integrating the 3 critical factors - people, processes & technology Saving time and money via automated tools Anticipating...

    Provided By Qualys

  • Webcasts // Jan 2010

    Proactive Vulnerability Management

    Speaker: Dr. Chenxi Wang, Principal Analyst, Security and Risk Management, Forrester Research, Inc. In this talk, Dr. Chenxi Wang, Principal Analyst for Security and Risk Management at Forrester Research, will cover the key aspects of proactive vulnerability management and more importantly, the steps via which you can follow to achieve...

    Provided By Qualys

  • Webcasts // Jan 2010

    On Demand Vulnerability Management

    Speaker: Jonathan Bitle, Senior Product Manager, Qualys This podcast examines what to look for in a self-auditing solution, how to use vulnerability management to ease the pain and why your software solution really matters. Government and industry regulations, along with mounting security threats, are causing corporations to consider continual self-audits....

    Provided By Qualys

  • Webcasts // Jan 2010

    Effective Workflow for Fixing Network Vulnerabilities & Policy Compliance

    Speaker: Sandra Gittlen, Technology Editor, NetworkWorld Speaker: Terry Ramos, Director of Strategic Development, Qualys This webcast Abstracts the 8 workflow processes that create an effective vulnerability management solution to ensure security and document compliance. Discover how the right software-as-a-service (SaaS) solution automates these processes for fast, cost-effective remediation and policy...

    Provided By Qualys

  • Webcasts // Jan 2010

    Qualys - Addressing Compliance Challenges with Automated Vulnerability Management

    Speaker: Dr. Chenxi Wang, Principal Analyst, Security and Risk Management, Forrester Research, Inc. Automated, on-demand vulnerability assessment and management is a powerful instrument for organizations to stay compliant and stay one step ahead of attackers. In this webcast, we will briefly address different compliance requirements and the industry best practices...

    Provided By Qualys

  • Webcasts // Jan 2010

    Web 2.0 Security Threats: How to Protect Your Enterprise Network

    Speaker: Dr. Chenxi Wang, Principal Analyst, Security and Risk Management, Forrester Research, Inc. As Enterprises are increasingly connected to the Internet and as hard organizational boundaries are fast disappearing, security professionals are facing fresh challenges in Enterprise computing. One crucial element of success in this environment is application security, which...

    Provided By Qualys

  • White Papers // Jan 2010

    Qualys - Effective Remediation of Network Vulnerabilities & Policy Compliance

    Consistent, ongoing execution of vulnerability management and policy compliance is difficult, if not impossible to do on a manual basis. There are simply too many ""moving parts"" to juggle and act on in a timely and cost-effective manner. This guide provides a step-by-step guide for automating the vulnerability and compliance...

    Provided By Qualys

  • White Papers // Jan 2010

    Qualys - Using Qualys Guard To Meet Sox Compliance & IT Control Objectives

    Currently, there is no single standard framework that explicitly defines what your organization must do for compliance. A big challenge for IT security professionals is navigating this ambiguity and achieving the organization's compliance goals effectively and on budget. This guide covers seven typical IT security compliance errors and outlines the...

    Provided By Qualys

  • White Papers // Jan 2010

    Avoiding 7 Common Mistakes of IT Security Compliance

    Currently, there is no single standard framework that explicitly defines what your organization must do for compliance. A big challenge for IT security professionals is navigating this ambiguity and achieving the organization's compliance goals effectively and on budget. This guide covers seven typical IT security compliance errors and outlines the...

    Provided By Qualys

  • White Papers // Jan 2010

    Strengthening Network Security with On Demand Vulnerability Management & Policy Compliance

    Despite defensive efforts with firewalls, intrusion detection, antivirus and the like, criminals, careless employees and contractors have exposed more than 158 million digital records of consumers' personally identifiable information since 2005. This security guide describes the requirements and on demand software-as-a-service (SaaS) solution called QualysGuard for effective vulnerability management and...

    Provided By Qualys

  • Webcasts // Jan 2010

    Addressing Compliance Challenges with Automated Vulnerability Management

    Speaker: Dr. Chenxi Wang, Principal Analyst, Security and Risk Management, Forrester Research, Inc. Automated, on-demand vulnerability assessment and management is a powerful instrument for organizations to stay compliant and stay one step ahead of attackers. In this webcast, we will briefly address different compliance requirements and the industry best practices...

    Provided By Qualys

  • Webcasts // Jan 2010

    Qualys - Effective Workflow for Fixing Network Vulnerabilities & Policy Compliance

    Effective Workflow for Fixing Network Vulnerabilities & Policy Compliance Speaker: Sandra Gittlen, Technology Editor, NetworkWorld Speaker: Terry Ramos, Director of Strategic Development, Qualys This webcast Abstracts the 8 workflow processes that create an effective vulnerability management solution to ensure security and document compliance. Discover how the right software-as-a-service (SaaS) solution...

    Provided By Qualys

  • Webcasts // Jan 2010

    Automating Policy Compliance and IT Governance

    Speaker: Jason Creech, Qualys This webcast covers the foundations of a successful IT Governance and Policy Compaliance program and how your organization can seamlessly align IT controls and processes with strategic business objectives. Key take-aways: * Defining current IT GRC challenges * Reviewing regulatory lansdscape and compliance requirements * Automating...

    Provided By Qualys

  • White Papers // Jan 2010

    Winning the PCI Compliance Battle

    A Guide for Merchants and Member Service Providers This white paper reviews the basics of PCI, including who must comply, compliance requirements, validation requirements and penalties. It also examines key things to look for when selecting a PCI network testing service and introduces QualysGuard PCI. Topics in this white paper...

    Provided By Qualys

  • White Papers // Jan 2010

    PCI Compliance for Dummies

    Complying with the PCI Data Security Standard may seem like a daunting task for merchants. This book is a quick guide to understanding how to protect cardholder data and comply with the requirements of PCI - from surveying the standard's requirements to detailing steps for verifying compliance. PCI Compliance for...

    Provided By Qualys

  • White Papers // Jan 2010

    Meeting Vulnerability Scanning Requirements for PCI

    The credit card industry is stepping up efforts to strengthen cardholder data security by raising member validation requirements for compliance with the Payment Card Industry Data Security Standard (PCI-DSS). As part of these requirements, both internal and external network scanning play a critical role in achieving compliance. This security guide...

    Provided By Qualys

  • Webcasts // Jan 2010

    PCI Compliance 2008: What You Need to Know

    Speaker: Sumedh Thankar, PCI Compliance Lead Engineer, Qualys This webcast covers the key facts you need to know about the current and upcoming PCI compliance requirements. In less than 30 minutes, this session gives you the straightforward break-down on all the new PCI changes. You'll also learn about today's best...

    Provided By Qualys

  • Webcasts // Jan 2010

    Winning the PCI Compliance Battle - Best Practices to Manage the PCI Process

    Speaker: Terry Ramos, Director Strategic Development, Qualys The Payment Card Industry Security Data Standard, or PCI, protects cardholders and businesses by establishing standard practices for processing, storing and transmitting credit card data but thefts still occur at an unprecedented rate. This webcast will explore: * Compliance Requirements of the PCI...

    Provided By Qualys

  • Webcasts // Jan 2010

    QualysGuard PCI Web Application Scanning Demonstration

    QualysGuard PCI 3.0 Web Application Scanning module is an automated tool for evaluating Web applications before and after deployment. This 10 minute demonstration is available on demand and includes a brief Abstract of the product along with a detailed walkthrough of the new features.

    Provided By Qualys

  • White Papers // Jan 2010

    Web Application Security ? How to Minimize Prevalent Risk of Attacks

    Vulnerabilities in web applications are now the largest vector of enterprise security attacks. Stories about exploits that compromise sensitive data frequently mention culprits such as "cross-site scripting," "SQL injection," and "buffer overflow." Vulnerabilities like these fall often outside the traditional expertise of network security managers. To help you understand how...

    Provided By Qualys

  • White Papers // Jan 2010

    Qualys - The Need for Vulnerability Management

    This guide describes the need for vulnerability management. It introduces the sources of vulnerabilities and their related fallout, then relates why the nature of modern threats to the network requires automated technology to counter sophisticated exploits. The guide defines elements of vulnerability management and how it controls the detection and...

    Provided By Qualys

  • White Papers // Jan 2010

    Qualys - Dynamic Best Practices of Vulnerability Management

    Yankee Group research reveals best practices in proactively identifying and correcting network weaknesses. Guidelines are based on Qualys' "Laws of Vulnerabilites" research.

    Provided By Qualys

  • White Papers // Jan 2010

    4 Key Steps to Automate IT Security Compliance A Unified Approach for IT, Audit and Operation Teams

    This paper provides a detailed discussion of the internal and external regulatory challenges now faced by organizations, the scope of these challenges, and 4 key ways in which they can be addressed through better business processes and automation.

    Provided By Qualys

  • White Papers // Jan 2010

    The Top 10 Reports for Managing Vulnerabilities

    New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes...

    Provided By Qualys

  • White Papers // Jan 2010

    Qualys- Strengthening Network Security with On Demand Vulnerability Management & Policy Compliance

    Despite defensive efforts with firewalls, intrusion detection, antivirus and the like, criminals, careless employees and contractors have exposed more than 158 million digital records of consumers' personally identifiable information since 2005. This security guide describes the requirements and on demand software-as-a-service (SaaS) solution called QualysGuard for effective vulnerability management and...

    Provided By Qualys

  • White Papers // Jan 2010

    Effective Remediation of Network Vulnerabilities & Policy Compliance

    Consistent, ongoing execution of vulnerability management and policy compliance is difficult, if not impossible to do on a manual basis. There are simply too many ""moving parts"" to juggle and act on in a timely and cost-effective manner. This guide provides a step-by-step guide for automating the vulnerability and compliance...

    Provided By Qualys

  • White Papers // Jan 2010

    Vulnerability Management Buyer's Checklist

    Key Questions to Ask Before You Select a VM Solution Choosing a solution for Vulnerability Management (VM) is a critical step toward protecting your organisation's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security....

    Provided By Qualys

  • Webcasts // Jan 2010

    Qualys - QualysGuard PCI Web Application Scanning Demonstration

    QualysGuard PCI 3.0 Web Application Scanning module is an automated tool for evaluating Web applications before and after deployment. This 10 minute demonstration is available on demand and includes a brief Abstract of the product along with a detailed walkthrough of the new features.

    Provided By Qualys

  • Case Studies // Dec 2009

    Sustainable, Secure Business Growth

    Paylocity provides web-based payroll, HR and time and attendance solutions across the U.S. They need to make certain its rapidly growing applications and dynamic infrastructure remains resilient to failure and resistant to breaches. Previous vulnerability assessment tools lacked the accuracy and automation needed for the continuous, consistent assessments necessary to...

    Provided By Qualys

  • Case Studies // Dec 2009

    Effective Risk Reduction

    Oslo, Norway-based IT services provider Cartagena delivers IT products and services to the most demanding of small and mid-sized enterprises. They need to provide its clients with professional, highly accurate, on-demand vulnerability assessments from a trusted third party so they can keep their systems secure and within regulatory compliance. Norway...

    Provided By Qualys

  • Case Studies // Nov 2009

    Delivering on Network Security and PCI DSS Compliance

    Blueport Commerce provides trusted, managed e-commerce technology and services to retail chains and organizations with unique e-commerce needs, including big ticket, customizable or difficult to ship products and complex business structures. Blueport Commerce must remain compliant with PCI DSS, and its customers need assurance that its systems operate to the...

    Provided By Qualys

  • Case Studies // Sep 2009

    University of Utah Writes New Thesis on Risk Management

    The University of Utah is ranked as one of the top public research universities in the nation. It's also the oldest and largest institution of higher education in the state. The challenge was the need to keep its systems secure, and within HIPAA compliance. University deployed QualysGuard providing control of...

    Provided By Qualys

  • White Papers // Jan 2014

    Adding Zero-Day Offense to Vulnerability Management

    This paper describes why your organization is vulnerable to zero day attacks and what you can do to add a zero-day offense to existing vulnerability management processes. It also describes how the Qualys Zero-Day Risk Analyzer enhances capabilities of the QualysGuard Cloud Platform with targeted intelligence and workflow to...

    Sponsored By Qualys

  • White Papers // Jan 2014

    Discovering Vulnerable Web Applications

    This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization's overall vulnerability management

    Sponsored By Qualys

  • Case Studies // Dec 2009

    Sustainable, Secure Business Growth

    Paylocity provides web-based payroll, HR and time and attendance solutions across the U.S. They need to make certain its rapidly growing applications and dynamic infrastructure remains resilient to failure and resistant to breaches. Previous vulnerability assessment tools lacked the accuracy and automation needed for the continuous, consistent assessments necessary to...

    Provided By Qualys

  • Case Studies // Jul 2011

    Astelit Dials Into a New, Powerful Vulnerability Management Service

    Astelit, the Ukrainian GSM operator, is widely known for its life brand that serves 8.7 million contract and prepaid subscribers. Astelit was relying on open source vulnerability scanners to conduct periodic assessments. While the systems were maintained securely, there was no repeatable vulnerability management process. Astelit needed a more effective,...

    Provided By Qualys

  • Case Studies // Jun 2010

    Etisalat Secures Growth

    Etisalat provides an array of communication services from phone to mobile, broadband, and cable television to specialized e-Government offerings, traditional e-mail, hosting, and Domain Name System (DNS) management services. They need to build an automated risk management program that could scale with Etisalat's rapid growth. Etisalat selected QualysGuard from Qualys...

    Provided By Qualys

  • Case Studies // Mar 2011

    Tata Communications Helps Customers Proactively Mitigate it Risk

    Tata Communications Limited may be best known for providing innovative voice and communication services within more than 200 countries, the company has expanded far beyond those roots. They sought a vulnerability management solution that would enable it to build and offer a diverse set of vulnerability management services. Tata Communications...

    Provided By Qualys

  • Case Studies // Jan 2009

    Risk Reduction: RightNow Technologies Finds a Better Way

    RightNow Technologies, Inc. knows how to manage relationships. The company's on demand customer relationship management software is used to efficiently help improve the customer service of more than 1,300 other organizations worldwide Business Need RightNowA's customers were increasingly asking their vendors to prove their IT security due diligence. To find...

    Provided By Qualys

  • Case Studies // Aug 2008

    Qualys Case Study: Etisalat Secures Growth

    For more than 30 years, Etisalat has provided telecommunications services from its headquarters in the United Arab Emirates, and it continues its development and growth. The challenge was to build an automated risk management program that could scale with Etisalat's rapid growth. Tight IT security team needed more security insight...

    Provided By Qualys

  • Case Studies // Apr 2009

    Ohio Dominican University Writes a New Security Curriculum

    Ohio Dominican University spans more than 64 beautiful acres in Columbus, Ohio. Founded in 1911 as the College of Saint Mary of the Springs, Ohio Dominican University's liberal arts curriculum teaches skills valuable throughout life and any career - critical thinking, proficient writing, and clear communication. It experienced a security...

    Provided By Qualys

  • Case Studies // Apr 2009

    For IT Security, University of Idaho Raises Its Grade

    The University of Idaho prides itself as a university that offers a distinctive combination of fascinating and career-building majors, graduate programs, a seasoned faculty, and renowned research capabilities. Like most universities, the University of Idaho runs a lean IT team. In an effort to improve security, University of Idaho wanted...

    Provided By Qualys

  • Case Studies // Sep 2009

    University of Utah Writes New Thesis on Risk Management

    The University of Utah is ranked as one of the top public research universities in the nation. It's also the oldest and largest institution of higher education in the state. The challenge was the need to keep its systems secure, and within HIPAA compliance. University deployed QualysGuard providing control of...

    Provided By Qualys

  • Case Studies // Jan 2009

    Relies on QualysGuard to Conduct Weekly Scans of Its Critical Banking Systems to Meet Growing Bank Regulations and Reduce Risk

    In the first quarter of this year, 1,220 new software vulnerabilities were uncovered. More than 80 such vulnerabilities that place business-technology systems at-risk are discovered, on average, each week. The challenge was that American State Bank needed to secure its new online banking services and also meet internal and F.D.I.C....

    Provided By Qualys

  • Case Studies // Jul 2008

    Certified Security Management Benefits FIDUCIA Customers

    FIDUCIA IT AG is provider of IT services Headquarters: Karlsruhe - Germany with 3,000 employees. The challenge was replacement of the Nessus opensource solution with a commercial risk-management tool. It replaced the Nessus open-source solution with QualysGuard. FIDUCIA IT deployed QualysGuard, Qualys that enabled easy implementation of the solution; self-explanatory;...

    Provided By Qualys

  • White Papers // Mar 2009

    Web Application Security - How to Minimize Prevalent Risk of Attacks

    Vulnerabilities in web applications are now the largest vector of enterprise security attacks. Last year, almost 55% of vulnerability disclosures affected web applications. At year end, 74% of web application vulnerabilities had no available patch for remediation, according to that report. Stories about exploits that compromise sensitive data frequently mention...

    Provided By Qualys

  • Case Studies // Dec 2009

    Effective Risk Reduction

    Oslo, Norway-based IT services provider Cartagena delivers IT products and services to the most demanding of small and mid-sized enterprises. They need to provide its clients with professional, highly accurate, on-demand vulnerability assessments from a trusted third party so they can keep their systems secure and within regulatory compliance. Norway...

    Provided By Qualys

  • Case Studies // Nov 2009

    Delivering on Network Security and PCI DSS Compliance

    Blueport Commerce provides trusted, managed e-commerce technology and services to retail chains and organizations with unique e-commerce needs, including big ticket, customizable or difficult to ship products and complex business structures. Blueport Commerce must remain compliant with PCI DSS, and its customers need assurance that its systems operate to the...

    Provided By Qualys

  • Webcasts // Jan 2010

    Fast Track: Planning & Deploying an Effective Vulnerability Management Program

    Speaker: Jonathan Bitle, Qualys This webcast covers the essential components of a successful Vulnerability Management program that allows you proactively identify risk to protect your network and critical business assets. Key take-aways: Integrating the 3 critical factors - people, processes & technology Saving time and money via automated tools Anticipating...

    Provided By Qualys

  • Webcasts // Jan 2010

    Proactive Vulnerability Management

    Speaker: Dr. Chenxi Wang, Principal Analyst, Security and Risk Management, Forrester Research, Inc. In this talk, Dr. Chenxi Wang, Principal Analyst for Security and Risk Management at Forrester Research, will cover the key aspects of proactive vulnerability management and more importantly, the steps via which you can follow to achieve...

    Provided By Qualys

  • Webcasts // Jan 2010

    On Demand Vulnerability Management

    Speaker: Jonathan Bitle, Senior Product Manager, Qualys This podcast examines what to look for in a self-auditing solution, how to use vulnerability management to ease the pain and why your software solution really matters. Government and industry regulations, along with mounting security threats, are causing corporations to consider continual self-audits....

    Provided By Qualys

  • Webcasts // Jan 2010

    Effective Workflow for Fixing Network Vulnerabilities & Policy Compliance

    Speaker: Sandra Gittlen, Technology Editor, NetworkWorld Speaker: Terry Ramos, Director of Strategic Development, Qualys This webcast Abstracts the 8 workflow processes that create an effective vulnerability management solution to ensure security and document compliance. Discover how the right software-as-a-service (SaaS) solution automates these processes for fast, cost-effective remediation and policy...

    Provided By Qualys

  • Webcasts // Jan 2010

    Qualys - Addressing Compliance Challenges with Automated Vulnerability Management

    Speaker: Dr. Chenxi Wang, Principal Analyst, Security and Risk Management, Forrester Research, Inc. Automated, on-demand vulnerability assessment and management is a powerful instrument for organizations to stay compliant and stay one step ahead of attackers. In this webcast, we will briefly address different compliance requirements and the industry best practices...

    Provided By Qualys

  • Webcasts // Jan 2010

    Web 2.0 Security Threats: How to Protect Your Enterprise Network

    Speaker: Dr. Chenxi Wang, Principal Analyst, Security and Risk Management, Forrester Research, Inc. As Enterprises are increasingly connected to the Internet and as hard organizational boundaries are fast disappearing, security professionals are facing fresh challenges in Enterprise computing. One crucial element of success in this environment is application security, which...

    Provided By Qualys

  • White Papers // Jan 2010

    Qualys - Effective Remediation of Network Vulnerabilities & Policy Compliance

    Consistent, ongoing execution of vulnerability management and policy compliance is difficult, if not impossible to do on a manual basis. There are simply too many ""moving parts"" to juggle and act on in a timely and cost-effective manner. This guide provides a step-by-step guide for automating the vulnerability and compliance...

    Provided By Qualys

  • White Papers // Jan 2010

    Qualys - Using Qualys Guard To Meet Sox Compliance & IT Control Objectives

    Currently, there is no single standard framework that explicitly defines what your organization must do for compliance. A big challenge for IT security professionals is navigating this ambiguity and achieving the organization's compliance goals effectively and on budget. This guide covers seven typical IT security compliance errors and outlines the...

    Provided By Qualys

  • White Papers // Jan 2010

    Avoiding 7 Common Mistakes of IT Security Compliance

    Currently, there is no single standard framework that explicitly defines what your organization must do for compliance. A big challenge for IT security professionals is navigating this ambiguity and achieving the organization's compliance goals effectively and on budget. This guide covers seven typical IT security compliance errors and outlines the...

    Provided By Qualys

  • White Papers // Jan 2010

    Strengthening Network Security with On Demand Vulnerability Management & Policy Compliance

    Despite defensive efforts with firewalls, intrusion detection, antivirus and the like, criminals, careless employees and contractors have exposed more than 158 million digital records of consumers' personally identifiable information since 2005. This security guide describes the requirements and on demand software-as-a-service (SaaS) solution called QualysGuard for effective vulnerability management and...

    Provided By Qualys

  • Webcasts // Jan 2010

    Addressing Compliance Challenges with Automated Vulnerability Management

    Speaker: Dr. Chenxi Wang, Principal Analyst, Security and Risk Management, Forrester Research, Inc. Automated, on-demand vulnerability assessment and management is a powerful instrument for organizations to stay compliant and stay one step ahead of attackers. In this webcast, we will briefly address different compliance requirements and the industry best practices...

    Provided By Qualys

  • Webcasts // Jan 2010

    Qualys - Effective Workflow for Fixing Network Vulnerabilities & Policy Compliance

    Effective Workflow for Fixing Network Vulnerabilities & Policy Compliance Speaker: Sandra Gittlen, Technology Editor, NetworkWorld Speaker: Terry Ramos, Director of Strategic Development, Qualys This webcast Abstracts the 8 workflow processes that create an effective vulnerability management solution to ensure security and document compliance. Discover how the right software-as-a-service (SaaS) solution...

    Provided By Qualys

  • Webcasts // Jan 2010

    Automating Policy Compliance and IT Governance

    Speaker: Jason Creech, Qualys This webcast covers the foundations of a successful IT Governance and Policy Compaliance program and how your organization can seamlessly align IT controls and processes with strategic business objectives. Key take-aways: * Defining current IT GRC challenges * Reviewing regulatory lansdscape and compliance requirements * Automating...

    Provided By Qualys

  • White Papers // Jan 2010

    Winning the PCI Compliance Battle

    A Guide for Merchants and Member Service Providers This white paper reviews the basics of PCI, including who must comply, compliance requirements, validation requirements and penalties. It also examines key things to look for when selecting a PCI network testing service and introduces QualysGuard PCI. Topics in this white paper...

    Provided By Qualys

  • White Papers // Jan 2010

    PCI Compliance for Dummies

    Complying with the PCI Data Security Standard may seem like a daunting task for merchants. This book is a quick guide to understanding how to protect cardholder data and comply with the requirements of PCI - from surveying the standard's requirements to detailing steps for verifying compliance. PCI Compliance for...

    Provided By Qualys

  • White Papers // Jan 2010

    Meeting Vulnerability Scanning Requirements for PCI

    The credit card industry is stepping up efforts to strengthen cardholder data security by raising member validation requirements for compliance with the Payment Card Industry Data Security Standard (PCI-DSS). As part of these requirements, both internal and external network scanning play a critical role in achieving compliance. This security guide...

    Provided By Qualys

  • Webcasts // Jan 2010

    PCI Compliance 2008: What You Need to Know

    Speaker: Sumedh Thankar, PCI Compliance Lead Engineer, Qualys This webcast covers the key facts you need to know about the current and upcoming PCI compliance requirements. In less than 30 minutes, this session gives you the straightforward break-down on all the new PCI changes. You'll also learn about today's best...

    Provided By Qualys

  • Webcasts // Jan 2010

    Winning the PCI Compliance Battle - Best Practices to Manage the PCI Process

    Speaker: Terry Ramos, Director Strategic Development, Qualys The Payment Card Industry Security Data Standard, or PCI, protects cardholders and businesses by establishing standard practices for processing, storing and transmitting credit card data but thefts still occur at an unprecedented rate. This webcast will explore: * Compliance Requirements of the PCI...

    Provided By Qualys

  • Webcasts // Jan 2010

    QualysGuard PCI Web Application Scanning Demonstration

    QualysGuard PCI 3.0 Web Application Scanning module is an automated tool for evaluating Web applications before and after deployment. This 10 minute demonstration is available on demand and includes a brief Abstract of the product along with a detailed walkthrough of the new features.

    Provided By Qualys

  • White Papers // Jan 2010

    Web Application Security ? How to Minimize Prevalent Risk of Attacks

    Vulnerabilities in web applications are now the largest vector of enterprise security attacks. Stories about exploits that compromise sensitive data frequently mention culprits such as "cross-site scripting," "SQL injection," and "buffer overflow." Vulnerabilities like these fall often outside the traditional expertise of network security managers. To help you understand how...

    Provided By Qualys

  • White Papers // Oct 2013

    Keep your PCs safe while surfing the Web

    Regardless of platform, the Web has become a hub of information and productivity. The browser has evolved to become one of the most-­used applications, which has drawn the attention of cyber criminals—making it a potential Achilles heel for security. Read more...

    Provided By Qualys

  • White Papers // Oct 2013

    Best Practices for Selecting a Vulnerability Management (VM) Solution

    With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether they are vulnerable to attack, find...

    Provided By Qualys

  • White Papers // Oct 2013

    Patch Acceleration for Stronger Security

    Patching is about fixing flawed software, and fast patching has become one of the recognized efficient mechanisms to improve your systems’ security and robustness to attacks. This paper describes an approach to patching that can efficiently accelerate the speed with which you apply patches. As part of a patching system,...

    Provided By Qualys

  • White Papers // Jan 2010

    Qualys - The Need for Vulnerability Management

    This guide describes the need for vulnerability management. It introduces the sources of vulnerabilities and their related fallout, then relates why the nature of modern threats to the network requires automated technology to counter sophisticated exploits. The guide defines elements of vulnerability management and how it controls the detection and...

    Provided By Qualys