qualys

Results 51 - 64 of 64Sort Results By: Published Date | Title | Company Name
By: Qualys     Published Date: Jan 08, 2015
Drivers for cloud solutions include the need to innovate, simplify and cut costs. Users say a key benefit cloud-based security is no need to deploy equipment or software. The cloud provider furnishes and hosts everything in secure data centers. This arrangement lets your business avoid capital expenses and to control ongoing costs. This paper describes how your small or medium-sized company can manage IT risks and maintain regulatory compliance with minimal staff and budget.
Tags : cloud solutions, security, secure data centers, it risks, compliance
     Qualys
By: Qualys     Published Date: Jan 07, 2009
Choosing a solution for Vulnerability Management (VM) is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security.
Tags : qualys, vm solution, vulnerability management, saas, database security, network patching, vulnerability patching, networking
     Qualys
By: Qualys     Published Date: Nov 16, 2012
Get the facts on PCI Compliance and learn how to comply with the PCI data security standard.
Tags : 
     Qualys
By: Qualys     Published Date: Nov 16, 2012
This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization's overall vulnerability management program.
Tags : web applications, web application security, security and compliance, security
     Qualys
By: Qualys     Published Date: Nov 16, 2012
This whitepaper discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smalles to multinational enterpries, to put trust back into the security equation.
Tags : cloud based services, security, it security, data breach, ssl, ssl governance
     Qualys
By: Qualys     Published Date: Nov 16, 2012
This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past.
Tags : vulnerability management, it security, security attacks, security data, qualys cloud platform, zero-day threats, security threats, it threats
     Qualys
By: Qualys     Published Date: Nov 16, 2012
This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : vulnerability management, it security, security attacks, security data, qualys cloud platform, zero-day threats, security threats, it threats
     Qualys
By: Qualys     Published Date: May 07, 2014
Learn the 8 best practices for selecting a Vulnerability Management solution and see how you can select the right solution for your organizationís needs.
Tags : qualys, vulnerability management, vm solution, security solutions, vm choices, it management, enterprise applications
     Qualys
By: Qualys     Published Date: Jun 03, 2015
Learn the 8 best practices for selecting a Web Application Scanning solution and see how you can select the right solution for your organizationís needs.
Tags : qualys, web application scanning, was solution, security solution, was choices, it management, enterprise applications
     Qualys
By: Qualys     Published Date: May 07, 2014
Learn how to easily pass an audit and see how you can better prepare the analyst in charge to be more productive by focusing time on analyzing the data and staying ahead of the audit curve.
Tags : qualys, it audit, it security, compliance, secure data, pass audit, prepare for audit, enterprise applications
     Qualys
By: Qualys     Published Date: Apr 05, 2011
To help you understand how to minimize these risks, Qualys provides this guide as a primer to web application security.
Tags : web application security, qualys, vulnerabilities, sql injection, ssi injection, xpath injection, attacks, qualysguard was 2.0
     Qualys
By: Qualys     Published Date: Apr 05, 2011
This guide explains how QualysGuard PC automates the "C" in GRCM by automatically scanning all assets, collecting operating system configuration and application access controls, mapping these to IT policy, and documenting compliance.
Tags : it data collection, it compliance, grcm controls, qualys, qualysguard pc, gcc, automated general computer control, legacy
     Qualys
By: Qualys     Published Date: Apr 05, 2011
This paper discusses the management of Risk and how Vulnerability Management is one of the few counter-measures easily justified by its ability to optimize risk.
Tags : it security, vulnerability management, risk management, qualysguard, risk optimization, countermeasure, threat, value
     Qualys
By: AWS     Published Date: Oct 07, 2019
While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and production
Tags : 
     AWS
Start   Previous    1 2 3     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com