Qualys

Displaying 1-40 of 61 results

  • White Papers // Jan 2014

    Discovering Vulnerable Web Applications

    This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization's overall vulnerability management

    Sponsored By Qualys

  • White Papers // Oct 2013

    Best Practices for Selecting a Vulnerability Management (VM) Solution

    With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether they are vulnerable to attack, find...

    Sponsored By Qualys

  • White Papers // Jan 2014

    Adding Zero-Day Offense to Vulnerability Management

    This paper describes why your organization is vulnerable to zero day attacks and what you can do to add a zero-day offense to existing vulnerability management processes. It also describes how the Qualys Zero-Day Risk Analyzer enhances capabilities of the QualysGuard Cloud Platform with targeted intelligence and workflow to...

    Provided By Qualys

  • White Papers // Oct 2013

    Keep your PCs safe while surfing the Web

    Regardless of platform, the Web has become a hub of information and productivity. The browser has evolved to become one of the most-­used applications, which has drawn the attention of cyber criminals—making it a potential Achilles heel for security. Read more...

    Provided By Qualys

  • White Papers // Oct 2013

    Patch Acceleration for Stronger Security

    Patching is about fixing flawed software, and fast patching has become one of the recognized efficient mechanisms to improve your systems’ security and robustness to attacks. This paper describes an approach to patching that can efficiently accelerate the speed with which you apply patches. As part of a patching system,...

    Provided By Qualys

  • Case Studies // Jul 2011

    Astelit Dials Into a New, Powerful Vulnerability Management Service

    Astelit, the Ukrainian GSM operator, is widely known for its life brand that serves 8.7 million contract and prepaid subscribers. Astelit was relying on open source vulnerability scanners to conduct periodic assessments. While the systems were maintained securely, there was no repeatable vulnerability management process. Astelit needed a more effective,...

    Provided By Qualys

  • Case Studies // Mar 2011

    Tata Communications Helps Customers Proactively Mitigate it Risk

    Tata Communications Limited may be best known for providing innovative voice and communication services within more than 200 countries, the company has expanded far beyond those roots. They sought a vulnerability management solution that would enable it to build and offer a diverse set of vulnerability management services. Tata Communications...

    Provided By Qualys

  • Case Studies // Jun 2010

    Etisalat Secures Growth

    Etisalat provides an array of communication services from phone to mobile, broadband, and cable television to specialized e-Government offerings, traditional e-mail, hosting, and Domain Name System (DNS) management services. They need to build an automated risk management program that could scale with Etisalat's rapid growth. Etisalat selected QualysGuard from Qualys...

    Provided By Qualys

  • White Papers // Jan 2010

    Qualys - Using Qualys Guard To Meet Sox Compliance & IT Control Objectives

    Currently, there is no single standard framework that explicitly defines what your organization must do for compliance. A big challenge for IT security professionals is navigating this ambiguity and achieving the organization's compliance goals effectively and on budget. This guide covers seven typical IT security compliance errors and outlines the...

    Provided By Qualys

  • White Papers // Jan 2010

    Avoiding 7 Common Mistakes of IT Security Compliance

    Currently, there is no single standard framework that explicitly defines what your organization must do for compliance. A big challenge for IT security professionals is navigating this ambiguity and achieving the organization's compliance goals effectively and on budget. This guide covers seven typical IT security compliance errors and outlines the...

    Provided By Qualys

  • White Papers // Jan 2010

    Strengthening Network Security with On Demand Vulnerability Management & Policy Compliance

    Despite defensive efforts with firewalls, intrusion detection, antivirus and the like, criminals, careless employees and contractors have exposed more than 158 million digital records of consumers' personally identifiable information since 2005. This security guide describes the requirements and on demand software-as-a-service (SaaS) solution called QualysGuard for effective vulnerability management and...

    Provided By Qualys

  • Webcasts // Jan 2010

    Addressing Compliance Challenges with Automated Vulnerability Management

    Speaker: Dr. Chenxi Wang, Principal Analyst, Security and Risk Management, Forrester Research, Inc. Automated, on-demand vulnerability assessment and management is a powerful instrument for organizations to stay compliant and stay one step ahead of attackers. In this webcast, we will briefly address different compliance requirements and the industry best practices...

    Provided By Qualys

  • Webcasts // Jan 2010

    Qualys - Effective Workflow for Fixing Network Vulnerabilities & Policy Compliance

    Effective Workflow for Fixing Network Vulnerabilities & Policy Compliance Speaker: Sandra Gittlen, Technology Editor, NetworkWorld Speaker: Terry Ramos, Director of Strategic Development, Qualys This webcast Abstracts the 8 workflow processes that create an effective vulnerability management solution to ensure security and document compliance. Discover how the right software-as-a-service (SaaS) solution...

    Provided By Qualys

  • Webcasts // Jan 2010

    Automating Policy Compliance and IT Governance

    Speaker: Jason Creech, Qualys This webcast covers the foundations of a successful IT Governance and Policy Compaliance program and how your organization can seamlessly align IT controls and processes with strategic business objectives. Key take-aways: * Defining current IT GRC challenges * Reviewing regulatory lansdscape and compliance requirements * Automating...

    Provided By Qualys

  • White Papers // Jan 2010

    Winning the PCI Compliance Battle

    A Guide for Merchants and Member Service Providers This white paper reviews the basics of PCI, including who must comply, compliance requirements, validation requirements and penalties. It also examines key things to look for when selecting a PCI network testing service and introduces QualysGuard PCI. Topics in this white paper...

    Provided By Qualys

  • White Papers // Jan 2010

    PCI Compliance for Dummies

    Complying with the PCI Data Security Standard may seem like a daunting task for merchants. This book is a quick guide to understanding how to protect cardholder data and comply with the requirements of PCI - from surveying the standard's requirements to detailing steps for verifying compliance. PCI Compliance for...

    Provided By Qualys

  • White Papers // Jan 2010

    Meeting Vulnerability Scanning Requirements for PCI

    The credit card industry is stepping up efforts to strengthen cardholder data security by raising member validation requirements for compliance with the Payment Card Industry Data Security Standard (PCI-DSS). As part of these requirements, both internal and external network scanning play a critical role in achieving compliance. This security guide...

    Provided By Qualys

  • Webcasts // Jan 2010

    PCI Compliance 2008: What You Need to Know

    Speaker: Sumedh Thankar, PCI Compliance Lead Engineer, Qualys This webcast covers the key facts you need to know about the current and upcoming PCI compliance requirements. In less than 30 minutes, this session gives you the straightforward break-down on all the new PCI changes. You'll also learn about today's best...

    Provided By Qualys

  • Webcasts // Jan 2010

    Winning the PCI Compliance Battle - Best Practices to Manage the PCI Process

    Speaker: Terry Ramos, Director Strategic Development, Qualys The Payment Card Industry Security Data Standard, or PCI, protects cardholders and businesses by establishing standard practices for processing, storing and transmitting credit card data but thefts still occur at an unprecedented rate. This webcast will explore: * Compliance Requirements of the PCI...

    Provided By Qualys

  • Webcasts // Jan 2010

    QualysGuard PCI Web Application Scanning Demonstration

    QualysGuard PCI 3.0 Web Application Scanning module is an automated tool for evaluating Web applications before and after deployment. This 10 minute demonstration is available on demand and includes a brief Abstract of the product along with a detailed walkthrough of the new features.

    Provided By Qualys

  • White Papers // Jan 2010

    Web Application Security ? How to Minimize Prevalent Risk of Attacks

    Vulnerabilities in web applications are now the largest vector of enterprise security attacks. Stories about exploits that compromise sensitive data frequently mention culprits such as "cross-site scripting," "SQL injection," and "buffer overflow." Vulnerabilities like these fall often outside the traditional expertise of network security managers. To help you understand how...

    Provided By Qualys

  • Webcasts // Jan 2010

    Qualys - QualysGuard PCI Web Application Scanning Demonstration

    QualysGuard PCI 3.0 Web Application Scanning module is an automated tool for evaluating Web applications before and after deployment. This 10 minute demonstration is available on demand and includes a brief Abstract of the product along with a detailed walkthrough of the new features.

    Provided By Qualys

  • White Papers // Jan 2010

    Qualys - The Need for Vulnerability Management

    This guide describes the need for vulnerability management. It introduces the sources of vulnerabilities and their related fallout, then relates why the nature of modern threats to the network requires automated technology to counter sophisticated exploits. The guide defines elements of vulnerability management and how it controls the detection and...

    Provided By Qualys

  • White Papers // Jan 2010

    Qualys - Dynamic Best Practices of Vulnerability Management

    Yankee Group research reveals best practices in proactively identifying and correcting network weaknesses. Guidelines are based on Qualys' "Laws of Vulnerabilites" research.

    Provided By Qualys

  • White Papers // Jan 2010

    4 Key Steps to Automate IT Security Compliance A Unified Approach for IT, Audit and Operation Teams

    This paper provides a detailed discussion of the internal and external regulatory challenges now faced by organizations, the scope of these challenges, and 4 key ways in which they can be addressed through better business processes and automation.

    Provided By Qualys

  • White Papers // Jan 2010

    The Top 10 Reports for Managing Vulnerabilities

    New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes...

    Provided By Qualys

  • White Papers // Jan 2010

    Qualys- Strengthening Network Security with On Demand Vulnerability Management & Policy Compliance

    Despite defensive efforts with firewalls, intrusion detection, antivirus and the like, criminals, careless employees and contractors have exposed more than 158 million digital records of consumers' personally identifiable information since 2005. This security guide describes the requirements and on demand software-as-a-service (SaaS) solution called QualysGuard for effective vulnerability management and...

    Provided By Qualys

  • White Papers // Jan 2010

    Effective Remediation of Network Vulnerabilities & Policy Compliance

    Consistent, ongoing execution of vulnerability management and policy compliance is difficult, if not impossible to do on a manual basis. There are simply too many ""moving parts"" to juggle and act on in a timely and cost-effective manner. This guide provides a step-by-step guide for automating the vulnerability and compliance...

    Provided By Qualys

  • White Papers // Jan 2010

    Vulnerability Management Buyer's Checklist

    Key Questions to Ask Before You Select a VM Solution Choosing a solution for Vulnerability Management (VM) is a critical step toward protecting your organisation's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security....

    Provided By Qualys

  • Webcasts // Jan 2010

    Fast Track: Planning & Deploying an Effective Vulnerability Management Program

    Speaker: Jonathan Bitle, Qualys This webcast covers the essential components of a successful Vulnerability Management program that allows you proactively identify risk to protect your network and critical business assets. Key take-aways: Integrating the 3 critical factors - people, processes & technology Saving time and money via automated tools Anticipating...

    Provided By Qualys

  • Webcasts // Jan 2010

    Proactive Vulnerability Management

    Speaker: Dr. Chenxi Wang, Principal Analyst, Security and Risk Management, Forrester Research, Inc. In this talk, Dr. Chenxi Wang, Principal Analyst for Security and Risk Management at Forrester Research, will cover the key aspects of proactive vulnerability management and more importantly, the steps via which you can follow to achieve...

    Provided By Qualys

  • Webcasts // Jan 2010

    On Demand Vulnerability Management

    Speaker: Jonathan Bitle, Senior Product Manager, Qualys This podcast examines what to look for in a self-auditing solution, how to use vulnerability management to ease the pain and why your software solution really matters. Government and industry regulations, along with mounting security threats, are causing corporations to consider continual self-audits....

    Provided By Qualys

  • Webcasts // Jan 2010

    Effective Workflow for Fixing Network Vulnerabilities & Policy Compliance

    Speaker: Sandra Gittlen, Technology Editor, NetworkWorld Speaker: Terry Ramos, Director of Strategic Development, Qualys This webcast Abstracts the 8 workflow processes that create an effective vulnerability management solution to ensure security and document compliance. Discover how the right software-as-a-service (SaaS) solution automates these processes for fast, cost-effective remediation and policy...

    Provided By Qualys

  • Webcasts // Jan 2010

    Qualys - Addressing Compliance Challenges with Automated Vulnerability Management

    Speaker: Dr. Chenxi Wang, Principal Analyst, Security and Risk Management, Forrester Research, Inc. Automated, on-demand vulnerability assessment and management is a powerful instrument for organizations to stay compliant and stay one step ahead of attackers. In this webcast, we will briefly address different compliance requirements and the industry best practices...

    Provided By Qualys

  • Webcasts // Jan 2010

    Web 2.0 Security Threats: How to Protect Your Enterprise Network

    Speaker: Dr. Chenxi Wang, Principal Analyst, Security and Risk Management, Forrester Research, Inc. As Enterprises are increasingly connected to the Internet and as hard organizational boundaries are fast disappearing, security professionals are facing fresh challenges in Enterprise computing. One crucial element of success in this environment is application security, which...

    Provided By Qualys

  • White Papers // Jan 2010

    Qualys - Effective Remediation of Network Vulnerabilities & Policy Compliance

    Consistent, ongoing execution of vulnerability management and policy compliance is difficult, if not impossible to do on a manual basis. There are simply too many ""moving parts"" to juggle and act on in a timely and cost-effective manner. This guide provides a step-by-step guide for automating the vulnerability and compliance...

    Provided By Qualys

  • Case Studies // Dec 2009

    Sustainable, Secure Business Growth

    Paylocity provides web-based payroll, HR and time and attendance solutions across the U.S. They need to make certain its rapidly growing applications and dynamic infrastructure remains resilient to failure and resistant to breaches. Previous vulnerability assessment tools lacked the accuracy and automation needed for the continuous, consistent assessments necessary to...

    Provided By Qualys

  • Case Studies // Dec 2009

    Effective Risk Reduction

    Oslo, Norway-based IT services provider Cartagena delivers IT products and services to the most demanding of small and mid-sized enterprises. They need to provide its clients with professional, highly accurate, on-demand vulnerability assessments from a trusted third party so they can keep their systems secure and within regulatory compliance. Norway...

    Provided By Qualys

  • Case Studies // Nov 2009

    Delivering on Network Security and PCI DSS Compliance

    Blueport Commerce provides trusted, managed e-commerce technology and services to retail chains and organizations with unique e-commerce needs, including big ticket, customizable or difficult to ship products and complex business structures. Blueport Commerce must remain compliant with PCI DSS, and its customers need assurance that its systems operate to the...

    Provided By Qualys

  • Case Studies // Sep 2009

    Maximizing Vulnerability Management and Regulatory Compliance

    OfficeMax is one of the largest office supply businesses in North America and operates approximately 1,025 superstores in the U.S., Mexico, Puerto Rico, and the US Virgin Islands. The challenge was the need to efficiently keep its business-technology systems secure and within PCI DSS compliance. Manual network and system vulnerability...

    Provided By Qualys

  • White Papers // Oct 2013

    Best Practices for Selecting a Vulnerability Management (VM) Solution

    With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether they are vulnerable to attack, find...

    Sponsored By Qualys

  • White Papers // Jan 2014

    Discovering Vulnerable Web Applications

    This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization's overall vulnerability management

    Sponsored By Qualys

  • White Papers // Jan 2010

    Qualys - Using Qualys Guard To Meet Sox Compliance & IT Control Objectives

    Currently, there is no single standard framework that explicitly defines what your organization must do for compliance. A big challenge for IT security professionals is navigating this ambiguity and achieving the organization's compliance goals effectively and on budget. This guide covers seven typical IT security compliance errors and outlines the...

    Provided By Qualys

  • White Papers // Jan 2010

    Avoiding 7 Common Mistakes of IT Security Compliance

    Currently, there is no single standard framework that explicitly defines what your organization must do for compliance. A big challenge for IT security professionals is navigating this ambiguity and achieving the organization's compliance goals effectively and on budget. This guide covers seven typical IT security compliance errors and outlines the...

    Provided By Qualys

  • White Papers // Jan 2010

    Strengthening Network Security with On Demand Vulnerability Management & Policy Compliance

    Despite defensive efforts with firewalls, intrusion detection, antivirus and the like, criminals, careless employees and contractors have exposed more than 158 million digital records of consumers' personally identifiable information since 2005. This security guide describes the requirements and on demand software-as-a-service (SaaS) solution called QualysGuard for effective vulnerability management and...

    Provided By Qualys

  • Webcasts // Jan 2010

    Addressing Compliance Challenges with Automated Vulnerability Management

    Speaker: Dr. Chenxi Wang, Principal Analyst, Security and Risk Management, Forrester Research, Inc. Automated, on-demand vulnerability assessment and management is a powerful instrument for organizations to stay compliant and stay one step ahead of attackers. In this webcast, we will briefly address different compliance requirements and the industry best practices...

    Provided By Qualys

  • Webcasts // Jan 2010

    Qualys - Effective Workflow for Fixing Network Vulnerabilities & Policy Compliance

    Effective Workflow for Fixing Network Vulnerabilities & Policy Compliance Speaker: Sandra Gittlen, Technology Editor, NetworkWorld Speaker: Terry Ramos, Director of Strategic Development, Qualys This webcast Abstracts the 8 workflow processes that create an effective vulnerability management solution to ensure security and document compliance. Discover how the right software-as-a-service (SaaS) solution...

    Provided By Qualys

  • Webcasts // Jan 2010

    Automating Policy Compliance and IT Governance

    Speaker: Jason Creech, Qualys This webcast covers the foundations of a successful IT Governance and Policy Compaliance program and how your organization can seamlessly align IT controls and processes with strategic business objectives. Key take-aways: * Defining current IT GRC challenges * Reviewing regulatory lansdscape and compliance requirements * Automating...

    Provided By Qualys

  • White Papers // Jan 2010

    Winning the PCI Compliance Battle

    A Guide for Merchants and Member Service Providers This white paper reviews the basics of PCI, including who must comply, compliance requirements, validation requirements and penalties. It also examines key things to look for when selecting a PCI network testing service and introduces QualysGuard PCI. Topics in this white paper...

    Provided By Qualys

  • White Papers // Jan 2010

    PCI Compliance for Dummies

    Complying with the PCI Data Security Standard may seem like a daunting task for merchants. This book is a quick guide to understanding how to protect cardholder data and comply with the requirements of PCI - from surveying the standard's requirements to detailing steps for verifying compliance. PCI Compliance for...

    Provided By Qualys

  • White Papers // Jan 2010

    Meeting Vulnerability Scanning Requirements for PCI

    The credit card industry is stepping up efforts to strengthen cardholder data security by raising member validation requirements for compliance with the Payment Card Industry Data Security Standard (PCI-DSS). As part of these requirements, both internal and external network scanning play a critical role in achieving compliance. This security guide...

    Provided By Qualys

  • Webcasts // Jan 2010

    PCI Compliance 2008: What You Need to Know

    Speaker: Sumedh Thankar, PCI Compliance Lead Engineer, Qualys This webcast covers the key facts you need to know about the current and upcoming PCI compliance requirements. In less than 30 minutes, this session gives you the straightforward break-down on all the new PCI changes. You'll also learn about today's best...

    Provided By Qualys

  • Webcasts // Jan 2010

    Winning the PCI Compliance Battle - Best Practices to Manage the PCI Process

    Speaker: Terry Ramos, Director Strategic Development, Qualys The Payment Card Industry Security Data Standard, or PCI, protects cardholders and businesses by establishing standard practices for processing, storing and transmitting credit card data but thefts still occur at an unprecedented rate. This webcast will explore: * Compliance Requirements of the PCI...

    Provided By Qualys

  • Webcasts // Jan 2010

    QualysGuard PCI Web Application Scanning Demonstration

    QualysGuard PCI 3.0 Web Application Scanning module is an automated tool for evaluating Web applications before and after deployment. This 10 minute demonstration is available on demand and includes a brief Abstract of the product along with a detailed walkthrough of the new features.

    Provided By Qualys

  • White Papers // Jan 2010

    Web Application Security ? How to Minimize Prevalent Risk of Attacks

    Vulnerabilities in web applications are now the largest vector of enterprise security attacks. Stories about exploits that compromise sensitive data frequently mention culprits such as "cross-site scripting," "SQL injection," and "buffer overflow." Vulnerabilities like these fall often outside the traditional expertise of network security managers. To help you understand how...

    Provided By Qualys

  • Webcasts // Jan 2010

    Qualys - QualysGuard PCI Web Application Scanning Demonstration

    QualysGuard PCI 3.0 Web Application Scanning module is an automated tool for evaluating Web applications before and after deployment. This 10 minute demonstration is available on demand and includes a brief Abstract of the product along with a detailed walkthrough of the new features.

    Provided By Qualys

  • White Papers // Oct 2008

    4 Key Steps to Automate IT Security Compliance: A Unified Approach for IT, Audit and Operation Teams

    For businesses today, managing IT security risk and meeting compliance requirements is paramount. The past decade has seen an unprecedented wave of security breaches that have compromised the integrity of company-owned information - resulting in substantial financial and operational loss while devastating the confidence of customers, business partners and stakeholders....

    Provided By Qualys

  • White Papers // Jun 2009

    Using Qualysguard to Meet Sox Compliance & IT Control Objectives

    The Sarbanes-Oxley Act of 2002 has fundamentally changed the business and regulatory landscape for all companies publically traded in the US. SOX is intended to instill confidence back into the investor community after several corporate scandals resulted in the loss of billions of dollars in invested capital. SOX does this...

    Provided By Qualys

  • Case Studies // Jan 2009

    Qualys Helps Metropolitan Bank Document Compliance and Manage Business Risk

    The challenge was cost-efficiently strengthen the security of bank networks, computers and applications. The bank was looking to strengthen and widen its protections and security precautions. The private community bank in New Orleans is growing rapidly, so ensuring the security of growing networks is critical for protection and privacy of...

    Provided By Qualys

  • Case Studies // Mar 2009

    ING Singapore: Fighting IT Security Risk on All Fronts

    ING Bank Singapore, A unit of ING Groep N.V. International with ?15+ billion market value (2009) and 130,000+ employees. The challenge was to cost-effectively achieve ongoing IT security and regulatory compliance risk mitigation for its own network and new company acquisitions. Tight IT security team needed more security insight and...

    Provided By Qualys

  • Case Studies // Jan 2009

    Qualys Case Study: New York Board of Trade

    The New York Board of Trade (NYBOT) is the world's largest commodities exchange for "Softs"-coffee, sugar, cocoa, cotton and Frozen Concentrated Orange Juice. The challenge was that it continuously assesses the state of network security and implements controls to minimize risk of interruption to trading. The network security web service...

    Provided By Qualys

  • Case Studies // Jan 2009

    Underpinning a Risk-Driven Strategy

    Standard Chartered is the world's leading emerging markets bank headquartered in London. It offers both consumer and wholesale banking services. The challenge was that they needed an effective method for tackling critical security problems quickly and efficiently in a high risk high profile environment and developing an effective, global, risk-driven...

    Provided By Qualys

  • Case Studies // Jan 2009

    Automating Network Security to Protect E-Gov Health Services and Data

    The State of Florida is renowned for sun-based fun and relaxation, but inside, IT workers serving Florida's population of 17 million have been hard at work transforming manual government operations into e-government. The challenge was to cost-efficiently improve network security of public health services and personal health data. Department of...

    Provided By Qualys

  • Case Studies // Jan 2009

    National Theater: PCI Compliance Takes the Stage

    To keep the business - and the performances - running, the theatre relies on about 60 servers, 1,000 networked workstations, and hosts and manages its own Web site that processes more than $20 million in ticket sales annually. The National Theatre needed to streamline the way it secures its infrastructure,...

    Provided By Qualys

  • Case Studies // Jun 2009

    When It Comes to IT Security and Compliance: Foxwoods Isn't Rolling the Dice

    Foxwoods operates six casinos that offer more than 7,000 slot machines and 400 gaming tables, 340,000 square feet of gaming space, 1,416 guest rooms and suites; and for conventions and group events, It features more than 55,000 square feet of meeting space and 25 conference rooms. The challenge was once...

    Provided By Qualys

  • Case Studies // Sep 2009

    Maximizing Vulnerability Management and Regulatory Compliance

    OfficeMax is one of the largest office supply businesses in North America and operates approximately 1,025 superstores in the U.S., Mexico, Puerto Rico, and the US Virgin Islands. The challenge was the need to efficiently keep its business-technology systems secure and within PCI DSS compliance. Manual network and system vulnerability...

    Provided By Qualys

  • Case Studies // Sep 2009

    Reaping the Harvest of Good IT Governance

    Its clear business vision and diligently applied strategy, over the course of 30 years, has helped Zagreb, Croatia-based Agrokor Group grow from a small, family-owned flower sales business to one of the largest retailers and providers of food and agriculture - including mineral water, meat, ice cream, and wine -...

    Provided By Qualys

  • Case Studies // Nov 2008

    Arval Service Lease Italy Automates Risk and Compliance Management

    Arval Holdings, Ltd., founded in 1989 and Europe's leading fleet management company, is no different. The challenge was to migrate vulnerability analysis from manual processes to automated and seamless processes, and maintain regulatory compliance. With limited resources and tight budgets, Arval's security managers needed to accomplish more by putting an...

    Provided By Qualys

  • Case Studies // Sep 2009

    Cost Efficient, Effective Vulnerability Management and PCI DSS Compliance

    ELKART Systemy Kart Elektronicznych Sp. z o.o. is the most experienced independent payment cards personalization service provider in Poland. Since ELKART provides payment cards personalization services, it must remain compliant with the Payment Card Industry Data Security Standard (PCI DSS). The certified Integrated Management System ELKART implemented requires and mature,...

    Provided By Qualys

  • Case Studies // Jun 2009

    Simplified PCI Compliance

    Ignite Media Solutions will move up to a Level 1 merchant from its Level 2 status, with multi millions of transactions annually. Ignite collects and processes payment information for its clients, so therefore Ignite Media Solutions must adhere to the Payment Card Industry Data Security Standard (PCI DSS). Ignite deployed...

    Provided By Qualys

  • Case Studies // Apr 2009

    Clickability Finds Powerful, Simple Security

    Clickability always has taken the security of its infrastructure seriously. Yet, as a result of the rising number of publicly disclosed worldwide data breaches and increased security regulations, customers are more often inquiring about the IT security efforts that Clickability has in place. The challenge was to streamline vulnerability and...

    Provided By Qualys

  • Case Studies // Jan 2009

    Risk Reduction: RightNow Technologies Finds a Better Way

    RightNow Technologies, Inc. knows how to manage relationships. The company's on demand customer relationship management software is used to efficiently help improve the customer service of more than 1,300 other organizations worldwide Business Need RightNowA's customers were increasingly asking their vendors to prove their IT security due diligence. To find...

    Provided By Qualys

  • White Papers // Oct 2013

    Keep your PCs safe while surfing the Web

    Regardless of platform, the Web has become a hub of information and productivity. The browser has evolved to become one of the most-­used applications, which has drawn the attention of cyber criminals—making it a potential Achilles heel for security. Read more...

    Provided By Qualys

  • White Papers // Oct 2013

    Patch Acceleration for Stronger Security

    Patching is about fixing flawed software, and fast patching has become one of the recognized efficient mechanisms to improve your systems’ security and robustness to attacks. This paper describes an approach to patching that can efficiently accelerate the speed with which you apply patches. As part of a patching system,...

    Provided By Qualys

  • White Papers // Jan 2014

    Adding Zero-Day Offense to Vulnerability Management

    This paper describes why your organization is vulnerable to zero day attacks and what you can do to add a zero-day offense to existing vulnerability management processes. It also describes how the Qualys Zero-Day Risk Analyzer enhances capabilities of the QualysGuard Cloud Platform with targeted intelligence and workflow to...

    Provided By Qualys

  • White Papers // Jan 2010

    Qualys - The Need for Vulnerability Management

    This guide describes the need for vulnerability management. It introduces the sources of vulnerabilities and their related fallout, then relates why the nature of modern threats to the network requires automated technology to counter sophisticated exploits. The guide defines elements of vulnerability management and how it controls the detection and...

    Provided By Qualys

  • White Papers // Jan 2010

    Qualys - Dynamic Best Practices of Vulnerability Management

    Yankee Group research reveals best practices in proactively identifying and correcting network weaknesses. Guidelines are based on Qualys' "Laws of Vulnerabilites" research.

    Provided By Qualys

  • White Papers // Jan 2010

    4 Key Steps to Automate IT Security Compliance A Unified Approach for IT, Audit and Operation Teams

    This paper provides a detailed discussion of the internal and external regulatory challenges now faced by organizations, the scope of these challenges, and 4 key ways in which they can be addressed through better business processes and automation.

    Provided By Qualys

  • White Papers // Jan 2010

    The Top 10 Reports for Managing Vulnerabilities

    New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes...

    Provided By Qualys

  • White Papers // Jan 2010

    Qualys- Strengthening Network Security with On Demand Vulnerability Management & Policy Compliance

    Despite defensive efforts with firewalls, intrusion detection, antivirus and the like, criminals, careless employees and contractors have exposed more than 158 million digital records of consumers' personally identifiable information since 2005. This security guide describes the requirements and on demand software-as-a-service (SaaS) solution called QualysGuard for effective vulnerability management and...

    Provided By Qualys