qualys

Results 26 - 50 of 62Sort Results By: Published Date | Title | Company Name
By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention.
Tags : qualys, network secure, it security, vulnerability, it budget, risk management, vulnerabilities
     Qualys
By: Qualys     Published Date: Jun 30, 2016
Few would argue with the statement that security is a top priority for IT departments at companies large and small today. Data is the currency of the digital age and the lifeblood of organizations, so strategies to protect corporate data are growing in importance and are now a topic of C-suite consideration. So with high-profile data breaches continuing to occur across industries, security leaders are revamping their strategies to keep pace.
Tags : security, cloud, cloud management, data security, it management
     Qualys
By: Qualys     Published Date: Sep 29, 2016
One of the biggest challenges faced by information security teams today is how to effectively prioritize their vulnerability remediation work.
Tags : protection, vulnerability, assetview, malware, web application
     Qualys
By: Qualys     Published Date: Sep 29, 2016
With ThreatPROTECT, you get a holistic, contextual and continually updated “at a glance” view of your threat exposure. The latest addition to the Qualys Cloud Platform, ThreatPROTECT eliminates guesswork and flags for you which vulnerabilities you must tackle now
Tags : protection, threats, data, vulnerabilities
     Qualys
By: Qualys     Published Date: Sep 29, 2016
With SAQ, an organization can quickly and precisely identify security and compliance gaps among third parties, as well as internally among its employees.
Tags : security, cloud-based, data, audit
     Qualys
By: AWS     Published Date: Jun 03, 2019
Background While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and
Tags : 
     AWS
By: Qualys     Published Date: Jan 11, 2017
It’s not easy being today’s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises has increased dramatically, while IT budgets have shrunk and skilled cyber security talent is virtually impossible to find.
Tags : information security, it compliance, it audit, it security, network security, web application security, application security
     Qualys
By: Qualys     Published Date: Jan 11, 2017
With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether they are vulnerable to attack, find fixes to the underlying problems, and protect yourself while those fixes are being implemented
Tags : information security, it compliance, it audit, it security, network security, web application security, application security
     Qualys
By: Qualys     Published Date: Jan 11, 2017
With attackers getting more sophisticated every day, manual methods of locating and testing web-based apps are no longer enough. The right Web Application Scanning (WAS) solution can help you systematically: discover web apps running in your network, determine whether or not they are vulnerable to attack, understand how to fix them, and protect your business while fixes are being implemented
Tags : information security, it compliance, it audit, it security, network security, web application security, application security
     Qualys
By: Qualys     Published Date: Jan 11, 2017
Companies lack the in-house expertise required to analyze threats and keep up with day-to-day security operations. And so, despite the best intentions, many security strategies fall short of their goals and leave companies vulnerable just as threats become more sophisticated and targeted.
Tags : information security, it compliance, it audit, it security, network security, web application security, application security
     Qualys
By: Qualys     Published Date: Jan 11, 2017
In this age of supply chain interconnectedness, a large organization may have hundreds of third parties with access to its physical premises, IT networks and data. Your organization may have a secure IT infrastructure, but third parties can make it vulnerable to breaches, which often result in corporate data theft, brand damage and hefty government fines.
Tags : information security, it compliance, it audit, it security, network security, web application security, application security
     Qualys
By: Qualys     Published Date: Jan 11, 2017
One of the biggest challenges faced by information security teams today is how to e?ectively prioritize their vulnerability remediation work.Burdened with this overload of vulnerability disclosures, infosec teams often get overwhelmed by the task at hand and throw up their hands in frustration. After all, no IT department has enough sta? and resources to promptly patch every single vulnerability within their environment.
Tags : information security, it compliance, it audit, it security, network security, web application security, application security
     Qualys
By: Qualys     Published Date: Jan 11, 2017
Continuous monitoring (CM) begets a process of continuous improvement that works to reduce attack surface and improve security posture, according to the 2016 SANS survey on CM conducted during the months of July to September. In it, 63% of respondents said CM was improving their security posture.
Tags : information security, it compliance, it audit, it security, network security, web application security, application security
     Qualys
By: Qualys     Published Date: Jan 11, 2017
Automated asset inventory might not be the first thing that comes to mind when considering cutting-edge security technologies. In the context of today’s distributed enterprise, however, it’s essential. Since the apps, systems, and services your users access to conduct business are already in the cloud, it makes sense to consider looking to cloud-based technologies to keep track of them all.
Tags : information security, it compliance, it audit, it security, network security, web application security, application security
     Qualys
By: Qualys     Published Date: Jan 11, 2017
As a mid-sized or smaller organization, there is a lure of feeling safety in obscurity. “We’re too small to be a target for cyber attacks” is a common refrain used to justify a lax network security posture. Unfortunately, it’s a refrain that may come to haunt you.
Tags : information security, it compliance, it audit, it security, network security, web application security, application security
     Qualys
By: Qualys     Published Date: Jan 11, 2017
When web applications are breached, enormous amounts of sensitive business data can be lost. According to Verizon’s 2014 Data Breach Investigations Report, web application attacks more than doubled in 2013 to become the #1 cause of security incidents
Tags : information security, it compliance, it audit, it security, network security, web application security, application security
     Qualys
By: Qualys     Published Date: Jan 11, 2017
IT departments are overwhelmed by the abundance of vulnerabilities that continue to grow at a rapid pace every day. They struggle to identify the most critical threats they must address right away at any given point to protect their organizations from a compromise.
Tags : information security, it compliance, it audit, it security, network security, web application security, application security
     Qualys
By: Qualys     Published Date: Jan 11, 2017
Businesses use the Internet as a vital global resource for huge benefits in linking workers, suppliers and customers. However, connecting with the global Internet exposes your company network to many threats.
Tags : information security, it compliance, it audit, it security, network security, web application security, application security
     Qualys
By: Qualys     Published Date: Jun 03, 2015
Get all the Facts and See How to Implement a Successful Vulnerability Management Program
Tags : management implementation, network security, solutions, key resources, security
     Qualys
By: Qualys     Published Date: Aug 08, 2014
An Introduction to Defending Your Business Against Today’s Most Common Cyber Attacks
Tags : cyber attacks, defense, web application, business data, application security
     Qualys
By: Qualys     Published Date: Jan 08, 2015
Learn what 488 IT professionals have to say in the 2014 Application Security Programs and Practices survey. Results indicate an increase in number of organizations with a formal application security program in place. Approximately 83% of respondents (up from 66%) have an Appsec program in place, and more than 37% (up from 33%) have a program that has been operating for more than five years.
Tags : application security programs, it professionals, formal application, security
     Qualys
By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : it security, information ecosystems, data-centric security, identity management, security
     Qualys
By: Qualys     Published Date: Jan 08, 2015
The Critical Security Controls (CSCs), a well-known roadmap for enterprise information assurance published and maintained by the Council on CyberSecurity, is being widely adopted across financial and government sectors, according to the second SANS survey on CSC adoption. Download this report from SANS to find out why more and more organizations of various types consider the CSCs a reliable mechanism to reduce attack surfaces, increase visibility and improve protection and response.
Tags : critical security controls, csc adoption, enterprise information assurance, cybersecurity, security
     Qualys
By: Qualys     Published Date: Jan 08, 2015
Imagine putting first responders on your operational team instantly on alert about new network vulnerabilities – and how to fix them? This capability is called “continuous monitoring” (CM) and a new guide from Qualys shows you how it can dramatically boost security of your network. Learn how CM provides you with an always-on view of potential security holes. The guide explains how using CM is a vital step toward achieving continuous security of your network – the Holy Grail for every network security manager! In the guide, you will learn how to automatically leverage vulnerability scans with CM for stronger security. Continuous Monitoring: A New Approach to Proactively Protecting Your Global Perimeter offers an easy blueprint for using automation to achieve continuous security and compliance. Download the guide now to learn more about CM: Requirements—why CM is vital Scanning—value of continuous vulnerability scans Best Practices—for using CM Benefits—examples of how CM improves se
Tags : continuous monitoring, network security, vulnerability, best practices, security
     Qualys
By: Qualys     Published Date: Jan 08, 2015
Drivers for cloud solutions include the need to innovate, simplify and cut costs. Users say a key benefit cloud-based security is no need to deploy equipment or software. The cloud provider furnishes and hosts everything in secure data centers. This arrangement lets your business avoid capital expenses and to control ongoing costs. This paper describes how your small or medium-sized company can manage IT risks and maintain regulatory compliance with minimal staff and budget.
Tags : cloud solutions, security, secure data centers, it risks, compliance
     Qualys
Start   Previous    1 2 3    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com