Qualys Company SummaryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Company Summary
Qualys

Overview: Qualys, Inc., the leading provider of on demand vulnerability management and policy compliance solutions, helps organizations of all sizes discover vulnerabilities, ensure regulatory compliance and prioritize remediation according to business risk.

KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.

Solutions offered by Qualys.
Research offered by Qualys

7 Essential Steps of Network Security by Qualys. November 2008 - This paper details the essential aspects of putting into place a measurable and sustainable 7 step vulnerability management program, and demonstrates how QualysGuard automates everything you need along the way.

  View 7 Essential Steps of Network Security research abstract

Best Practices for Cloud Security by Qualys. January 31, 2012 - In this essential white paper, discover the benefits that your organization can realize by embracing cloud services, including more effective and cost-efficient security. Also inside, discover cloud cautions and pitfalls to avoid – read on now to learn more.

  View Best Practices for Cloud Security research abstract

Case Study: WebEx - Securing Web Collaboration by Qualys. May 18, 2010 - Read this case study to learn about the vulnerability and compliance risk management program WebEx has implemented to ensure security and confidentiality among their customers.

  View Case Study: WebEx - Securing Web Collaboration research abstract

Discovering Vulnerable Web Applications by Qualys. August 31, 2012 - This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.

  View Discovering Vulnerable Web Applications research abstract

Guide to Effective Remediation of Network Vulnerabilities and Policy Compliance by Qualys. November 2008 - This guide describes the major workflow processes of vulnerability management and how QualysGuard, as an on demand software-as-a-service automates most of these for fast, cost-effective remediation and compliance documentation.

  View Guide to Effective Remediation of Network Vulnerabilities and Policy Compliance research abstract

IT Policy Compliance for Dummies® by Qualys. April 28, 2010 - This book simply explains IT policy compliance and the steps your organisation needs to carry out to prove compliance to an independent auditor. After reading this book you'll know how to create compliance policies and prepare your IT operations to fulfill those requirements.

  View IT Policy Compliance for Dummies® research abstract

Nine Steps to Smart Security for Small Businesses by Qualys. October 18, 2011 - This guide uncovers nine simple steps for implementing smart security for your business. View now to explore why firewalls and anti-virus are not enough, and how to reduce risk while cutting costs.

  View Nine Steps to Smart Security for Small Businesses research abstract

The Big Shift to Cloud-based Security by Qualys. January 11, 2011 - Access this white paper to learn how small and medium-sized organizations can manage their IT risks and maintain regulatory compliance with minimal staff and budget, using cloud-based security.

  View The Big Shift to Cloud-based Security research abstract

The Top 10 Reports for Managing Vulnerabilities by Qualys. July 30, 2012 - Observing the complete lifecycle of vulnerability management begins with asset discovery. Learn more about the key steps for successful management with this informative resource. How can you improve your security?

  View The Top 10 Reports for Managing Vulnerabilities research abstract

The Urgent Need to rethink Security Using the Cloud by Qualys. February 28, 2012 - This informative resource describes the many benefits that accompany the shift to a cloud-based security strategy. Discover how you can simplify, centralize, and enhance everything from endpoint security to compliance. Reduce web app vulnerabilities and manage threats with ease -- read on to learn more.

  View The Urgent Need to rethink Security Using the Cloud research abstract

Web Application Security - How to Minimise Prevalent Risk of Attacks by Qualys. March 02, 2009 - Read this white paper to understand how to minimise vulnerabilities in web applications. A guide to web application security outlines typical web application vulnerabilities and provides a comparison of web application vulnerability detection options.

  View Web Application Security - How to Minimise Prevalent Risk of Attacks research abstract

Web Application Security — How to Minimize Prevalent Risk of Attacks by Qualys. January 11, 2011 - This guide surveys typical web application vulnerabilities, compares options for detection, and introduces the QualysGuard Web Application Scanning solution – a new on demand service from Qualys that automates detection of the most prevalent vulnerabilities in custom web applications.

  View Web Application Security — How to Minimize Prevalent Risk of Attacks research abstract

Web Application Security: How to Minimize the Risk of Attacks by Qualys. July 26, 2012 - This informative white paper outlines the importance of Web application security. With over 55 percent of vulnerabilities in 2010 resulting in attacks, a solution is necessary. Learn more about the different types of Web application vulnerabilities as well as how to detect vulnerabilities more efficiently.

  View Web Application Security: How to Minimize the Risk of Attacks research abstract

Winning the PCI Compliance Battle by Qualys. October 17, 2011 - This resource offers a guide for merchants and member services providers for meeting the requirements PCI DSS.

  View Winning the PCI Compliance Battle research abstract

Winning the PCI Compliance Battle: A Guide for Merchants and Member Service Providers by Qualys. January 11, 2011 - The PCI Data Security Standard requirements apply to all payment card network members, merchants and service providers that store, process or transmit cardholder data. This guide will outline the six core requirement categories, participation and validation requirements, how to select a PCI networking testing service and more.

  View Winning the PCI Compliance Battle: A Guide for Merchants and Member Service Providers research abstract

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts