On Demand Security


Qualys, Inc. is the leading provider of on demand IT security risk and compliance management solutions – delivered as a service. Qualys’ Software-as-a-Service solutions are deployed in a matter of hours anywhere in the world, providing customers an immediate and continuous view of their security and compliance postures. The QualysGuard® service is used today by more than 3,500 organizations in 85 countries, including 40 of the Fortune Global 100 and performs more than 200 million IP audits per year. Qualys has the largest vulnerability management deployment in the world at a Fortune Global 50 company. Qualys has established strategic agreements with leading managed service providers and consulting organizations including BT, Etisalat, Fujitsu, IBM, I(TS)2, LAC, SecureWorks, Symantec, Tata Communications, TELUS and VeriSign.
Featured White Papers

Free Whitepaper: Building a Web Application Security Program
This detailed report shows how to build a pragmatic web application security program that constrains costs while still providing effective security.

Download   Discussion

Free Guide: Web Application Security – How to Minimize Prevalent Risk of Attacks
To help you understand how to minimize the vulnerabilities in web applications, Qualys provides this guide as a primer to web application security. The guide covers:

- typical web application vulnerabilities
- comparison of options for web application vulneraility detection
- QualysGuard Web Application Scanning solution

Download   Discussion


Technology Briefing Series

These brief (~20 min) webcasts offer best practices and thought leadership on a variety of security and compliance topics, including: Vulnerability Management, Policy Compliance, PCI Compliance, and Web Application Security.


Archived Recordings

Vulnerability Management


Fast Track: Planning & Deploying an Effective Vulnerability Management Program

Presenter: Jonathan Bitle

Abstract: This webcast covers the essential components of a successful Vulnerability Management program that allows you proactively identify risk to protect your network and critical business assets.


ABC’s of Securing Educational Networks

Presenter: Jonathan Bitle

Abstract: This webcast covers real-world examples of how today’s security professionals at educational institutions are protecting their networks.


Policy Compliance


Automating Policy Compliance and IT Governance

Presenter: Jason Creech

Abstract: This
webcast covers the foundations of a successful IT Governance and Policy Compaliance program and how your organization can seamlessly align IT controls and processes with strategic business objectives.


7 Mistakes of IT Security Compliance – and Steps to Avoid Them

Presenter: Jason Creech

Abstract: This 20-min webcast describes seven typical IT security compliance errors and outlines the best practices you can immediately apply to your environment to help your company achieve compliance.


Delivering IT Compliance Solutions in the Cloud

Presenter: Jason Creech

Abstract: This 20-min presentation focuses on how cloud computing is changing the way organizations are meeting their compliance objectives – efficiently and cost-effectively. In addition, Jason outlines a best-practice approach to address even the most complex IT compliance initiatives.

PCI Compliance


How to Prioritize PCI DSS Compliance

Presenter: Anton Chuvakin and Terry Ramos

Abstract: Using
the recently released PCI Council “Prioritized Approach” guidance, this 20-min briefing discusses how organizations can effectively focus their PCI DSS implementation efforts in order to ensure the security of cardholder data, reduce information risk and protect the organization — all while on the shortest path towards PCI DSS validation.


PCI Compliance 2008: What You Need to Know

Presenter: Sumedh Thakar

Abstract: This webcast covers the key facts you need to know about the current and upcoming PCI compliance requirements. In less than 30 minutes, this session gives you the straightforward breakdown on all the new PCI changes. You’ll also learn about today’s best practice methodologies used by leading organizations to achieve compliance and avoid


PCI Myths: Common Mistakes and Misconceptions About PCI

Presenter: Anton Chuvakin

Abstract: The
briefing covers PCI DSS-related myths and misconceptions that are common among some merchants and other organizations dealing with PCI DSS challenges. Mistakes related to technical and process side of PCI, self-assessment and audits as well as PCI validation requirements will be discussed. The information will be useful to all merchants dealing with credit card information and thus struggling with PCI DSS mandates.


10 Tips to Achieve PCI Compliance

Presenter: Terry Ramos and Sumedh Thakar

Abstract: In this brief webcast session, Terry Ramos and Sumedh Thakar share the 10 Best-Practice tips merchants need to focus on to achieve PCI Compliance, protect cardholder data, and establish a successful risk reduction program.


Web Application Security (WAS)


Web Application Security 101 – What You Need to Know

Presenter: Michael Shema

Abstract: This
brief session will present the basics of Web Application Security and how to safeguard your web infrastructure against the most prevalent online threats and security risks, such as: cross-site scripting (XSS) attacks, SQL injection, directory traversals, and other web vulnerabilities. Learn how to proactively identify critical web application vulnerabilities and take corrective actions to minimize risks.

Additional Qualys White Papers


Key Questions to Ask Before You Select a VM Solution

Choosing a solution for Vulnerability Management (VM) is a critical step toward protecting your organization’s network and data.
Read more


Rapid changes within technology and the evolving sophistication of attack methods used to infiltrate systems create the greatest set of challenges faced by IT administrators trying to keep their systems secure and within regulatory compliance.
Read more

Qualys Newsletters

Qualys News

Sign up for newest Whitepapers From Tek-tips

Email Addresss :

Confirm Email :

Recent Posts