Overview: Qualys, Inc., the leading provider of on demand vulnerability management and policy compliance solutions, helps organizations of all sizes discover vulnerabilities, ensure regulatory compliance and prioritize remediation according to business risk.
KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.
Solutions offered by Qualys.
Research offered by Qualys
7 Essential Steps of Network Security by Qualys. November 2008 - This paper details the essential aspects of putting into place a measurable and sustainable 7 step vulnerability management program, and demonstrates how QualysGuard automates everything you need along the way.
Adding Zero-Day Offence to Vulnerability Management by Qualys. May 31, 2012 - In this white paper, discover why zero-day threats pose such an alarming problem for modern organizations, and learn all you need to know in order to add an effective zero-day offense to your existing vulnerability management strategy. Don't wait – read on now to get started.
Automating the SANS 20 Critical Security Controls with QualysGuard by Qualys. March 29, 2013 - The SANS 20 Critical Security Controls were compiled from a variety of security pros to be a blueprint for today's CISOs and CIOs on deploying effective strategies and solutions to combat today's modern threats. View this white paper to learn more!
Best Practices for Cloud Security by Qualys. January 31, 2012 - In this essential white paper, discover the benefits that your organization can realize by embracing cloud services, including more effective and cost-efficient security. Also inside, discover cloud cautions and pitfalls to avoid – read on now to learn more.
Case Study: WebEx - Securing Web Collaboration by Qualys. May 18, 2010 - Read this case study to learn about the vulnerability and compliance risk management program WebEx has implemented to ensure security and confidentiality among their customers.
Discovering Vulnerable Web Applications by Qualys. August 31, 2012 - Web application vulnerabilities have emerged as a major attack vector for cybercrime. This white paper outlines how your organization can effectively identify, catalog, and scan web applications in order to more effectively manage risk and reduce vulnerabilities – read on to learn more.
Guide to Effective Remediation of Network Vulnerabilities and Policy Compliance by Qualys. November 2008 - This guide describes the major workflow processes of vulnerability management and how QualysGuard, as an on demand software-as-a-service automates most of these for fast, cost-effective remediation and compliance documentation.
IT Policy Compliance for Dummies® by Qualys. April 28, 2010 - This book simply explains IT policy compliance and the steps your organisation needs to carry out to prove compliance to an independent auditor. After reading this book you'll know how to create compliance policies and prepare your IT operations to fulfill those requirements.
Nine Steps to Smart Security for Small Businesses by Qualys. October 18, 2011 - This guide uncovers nine simple steps for implementing smart security for your business. View now to explore why firewalls and anti-virus are not enough, and how to reduce risk while cutting costs.
Patch Acceleration for Stronger Security by Qualys. September 30, 2012 - This white paper counts down ten tactics for achieving more efficient patch management. Inside, discover a strategy that allows you to identify and prioritize vulnerabilities that pose the greatest risk and accelerate the speed at which patches are applied – read on to learn more.
SANS Survey on Application Security Programs and Practices by Qualys. December 31, 2012 - More and more, web applications are being leveraged as a top attack vector, and forward-thinking organizations need to prioritize app security. This survey of nearly 700 IT professionals outlines common and effective application security practices, giving you the insight you need to plan for security success.
Security Based on Trust Not Fear by Qualys. August 31, 2012 - Cloud-based services are helping organizations of all shapes and sizes improve their security posture and reduce vulnerabilities – especially when it comes to web applications and websites. View this white paper to learn how the cloud can help you put trust back into the security equation.
The Big Shift to Cloud-based Security by Qualys. January 11, 2011 - Access this white paper to learn how small and medium-sized organizations can manage their IT risks and maintain regulatory compliance with minimal staff and budget, using cloud-based security.
The Top 10 Reports for Managing Vulnerabilities by Qualys. July 30, 2012 - Observing the complete lifecycle of vulnerability management begins with asset discovery. Learn more about the key steps for successful management with this informative resource. How can you improve your security?
The Urgent Need to rethink Security Using the Cloud by Qualys. February 28, 2012 - This informative resource describes the many benefits that accompany the shift to a cloud-based security strategy. Discover how you can simplify, centralize, and enhance everything from endpoint security to compliance. Reduce web app vulnerabilities and manage threats with ease -- read on to learn more.
Vulnerability Management Evolution: From Tactical Scanner to Strategic Platform by Qualys. May 15, 2012 - This essential white paper explores the evolution of yesterday's vulnerability scanners into strategic platforms, giving you meaningful insight into which security systems are most at risk. See how you can determine your security priorities and reduce risk by planning for defensive success – read on to get started.
Web Application Security - How to Minimise Prevalent Risk of Attacks by Qualys. March 02, 2009 - Read this white paper to understand how to minimise vulnerabilities in web applications. A guide to web application security outlines typical web application vulnerabilities and provides a comparison of web application vulnerability detection options.
Web Application Security — How to Minimize Prevalent Risk of Attacks by Qualys. January 11, 2011 - This guide surveys typical web application vulnerabilities, compares options for detection, and introduces the QualysGuard Web Application Scanning solution – a new on demand service from Qualys that automates detection of the most prevalent vulnerabilities in custom web applications.
Web Application Security: How to Minimize the Risk of Attacks by Qualys. July 26, 2012 - This informative white paper outlines the importance of Web application security. With over 55 percent of vulnerabilities in 2010 resulting in attacks, a solution is necessary. Learn more about the different types of Web application vulnerabilities as well as how to detect vulnerabilities more efficiently.
Winning the PCI Compliance Battle by Qualys. October 17, 2011 - This resource offers a guide for merchants and member services providers for meeting the requirements PCI DSS.
Winning the PCI Compliance Battle: A Guide for Merchants and Member Service Providers by Qualys. January 11, 2011 - The PCI Data Security Standard requirements apply to all payment card network members, merchants and service providers that store, process or transmit cardholder data. This guide will outline the six core requirement categories, participation and validation requirements, how to select a PCI networking testing service and more.