Overview: Qualys, Inc., the leading provider of on demand vulnerability management and policy compliance solutions, helps organizations of all sizes discover vulnerabilities, ensure regulatory compliance and prioritize remediation according to business risk.
KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.
Solutions offered by Qualys.
Research offered by Qualys
7 Essential Steps of Network Security by Qualys. November 2008 - This paper details the essential aspects of putting into place a measurable and sustainable 7 step vulnerability management program, and demonstrates how QualysGuard automates everything you need along the way.
Automating the SANS 20 Critical Security Controls by Qualys. March 31, 2013 - This guide explores security automation and how you can ensure system security with 4 main strategies.
Best Practices for Cloud Security by Qualys. January 31, 2012 - In this essential white paper, discover the benefits that your organization can realize by embracing cloud services, including more effective and cost-efficient security. Also inside, discover cloud cautions and pitfalls to avoid – read on now to learn more.
Best Practices for Selecting a Vulnerability Management (VM) Solution by Qualys. May 16, 2013 - This guide explores some best practices for deploying a VM solution and outlines how it is essential for your security strategy.
Best Practices for Selecting a Web Application Scanning (WAS) Solution by Qualys. May 16, 2013 - This informative guide explores best practices for choosing a Web application scanning solution.
Case Study: WebEx - Securing Web Collaboration by Qualys. May 18, 2010 - Read this case study to learn about the vulnerability and compliance risk management program WebEx has implemented to ensure security and confidentiality among their customers.
Discovering Vulnerable Web Applications by Qualys. August 31, 2012 - This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
Guide to Effective Remediation of Network Vulnerabilities and Policy Compliance by Qualys. November 2008 - This guide describes the major workflow processes of vulnerability management and how QualysGuard, as an on demand software-as-a-service automates most of these for fast, cost-effective remediation and compliance documentation.
IT Policy Compliance for Dummies® by Qualys. April 28, 2010 - This book simply explains IT policy compliance and the steps your organisation needs to carry out to prove compliance to an independent auditor. After reading this book you'll know how to create compliance policies and prepare your IT operations to fulfill those requirements.
Nine Steps to Smart Security for Small Businesses by Qualys. October 18, 2011 - This guide uncovers nine simple steps for implementing smart security for your business. View now to explore why firewalls and anti-virus are not enough, and how to reduce risk while cutting costs.
Nine Steps to Smart Security for Small Businesses by Qualys. December 30, 2011 - This white paper lists 9 steps to achieving smart security for small businesses and focuses on how a cloud security solution can benefit organizations without the resources for traditional security approaches.
Security based on trust not fear by Qualys. April 17, 2014 - This paper provides examples of how cloud services can be used to ensure Web applications and websites instill trust and confidence in the minds of customers.
The Big Shift to Cloud-based Security by Qualys. April 15, 2014 - Access this resource to discover the benefits of cloud-based security, especially for small and medium-sized businesses (SMBs) who have fewer resources when mitigating increasing risks and compliance mandates.
The Big Shift to Cloud-based Security by Qualys. January 11, 2011 - Access this white paper to learn how small and medium-sized organizations can manage their IT risks and maintain regulatory compliance with minimal staff and budget, using cloud-based security.
The Top 10 Reports for Managing Vulnerabilities by Qualys. July 30, 2012 - Observing the complete lifecycle of vulnerability management begins with asset discovery. Learn more about the key steps for successful management with this informative resource. How can you improve your security?
The Top 10 Reports for Managing Vulnerabilities by Qualys. April 17, 2014 - This paper introduces 10 of the most important vulnerability management, organized across the four key steps in the vulnerability management lifecycle.
The Urgent Need to rethink Security Using the Cloud by Qualys. February 28, 2012 - This informative resource describes the many benefits that accompany the shift to a cloud-based security strategy. Discover how you can simplify, centralize, and enhance everything from endpoint security to compliance. Reduce web app vulnerabilities and manage threats with ease -- read on to learn more.
Web Application Security - How to Minimise Prevalent Risk of Attacks by Qualys. March 02, 2009 - Read this white paper to understand how to minimise vulnerabilities in web applications. A guide to web application security outlines typical web application vulnerabilities and provides a comparison of web application vulnerability detection options.
Web Application Security — How to Minimize Prevalent Risk of Attacks by Qualys. January 11, 2011 - This guide surveys typical web application vulnerabilities, compares options for detection, and introduces the QualysGuard Web Application Scanning solution – a new on demand service from Qualys that automates detection of the most prevalent vulnerabilities in custom web applications.
Web Application Security: How to Minimize the Risk of Attacks by Qualys. July 26, 2012 - This informative white paper outlines the importance of Web application security. With over 55 percent of vulnerabilities in 2010 resulting in attacks, a solution is necessary. Learn more about the different types of Web application vulnerabilities as well as how to detect vulnerabilities more efficiently.
Winning the PCI Compliance Battle by Qualys. October 17, 2011 - This resource offers a guide for merchants and member services providers for meeting the requirements PCI DSS.
Winning the PCI Compliance Battle: A Guide for Merchants and Member Service Providers by Qualys. January 11, 2011 - The PCI Data Security Standard requirements apply to all payment card network members, merchants and service providers that store, process or transmit cardholder data. This guide will outline the six core requirement categories, participation and validation requirements, how to select a PCI networking testing service and more.