際際滷shows by User: Qualys / http://www.slideshare.net/images/logo.gif 際際滷shows by User: Qualys / Thu, 15 Feb 2018 20:06:44 GMT 際際滷Share feed for 際際滷shows by User: Qualys Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations Outside the EU /slideshow/gdpr-deadline-readiness-and-impact-to-global-organizations-outside-the-eu/88068928 gdprdeadlinereadinessandimpacttoglobalorganizationsoutsidetheeu-180215200644
Learn to effectively navigate the security risks, new regulations, and new technologies on your journey to a secure and compliant digital transformation with this Qualys webcast series. In this webcast, Tim White, Director of Product Management at Qualys, explained how Qualys helps customers worldwide comply with the European Union General Data Protection Regulation (GDPR). You will learn how Qualys security and compliance apps enable GDPR compliance by: Tracking and classifying the IT assets which contain EU customers personal data Providing ongoing protection of personal data across global IT environments and third parties Maintaining continuous visibility of your organizations GDPR compliance state Watch the on-demand recording: https://goo.gl/DkNq52]]>

Learn to effectively navigate the security risks, new regulations, and new technologies on your journey to a secure and compliant digital transformation with this Qualys webcast series. In this webcast, Tim White, Director of Product Management at Qualys, explained how Qualys helps customers worldwide comply with the European Union General Data Protection Regulation (GDPR). You will learn how Qualys security and compliance apps enable GDPR compliance by: Tracking and classifying the IT assets which contain EU customers personal data Providing ongoing protection of personal data across global IT environments and third parties Maintaining continuous visibility of your organizations GDPR compliance state Watch the on-demand recording: https://goo.gl/DkNq52]]>
Thu, 15 Feb 2018 20:06:44 GMT /slideshow/gdpr-deadline-readiness-and-impact-to-global-organizations-outside-the-eu/88068928 Qualys@slideshare.net(Qualys) Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations Outside the EU Qualys Learn to effectively navigate the security risks, new regulations, and new technologies on your journey to a secure and compliant digital transformation with this Qualys webcast series. In this webcast, Tim White, Director of Product Management at Qualys, explained how Qualys helps customers worldwide comply with the European Union General Data Protection Regulation (GDPR). You will learn how Qualys security and compliance apps enable GDPR compliance by: Tracking and classifying the IT assets which contain EU customers personal data Providing ongoing protection of personal data across global IT environments and third parties Maintaining continuous visibility of your organizations GDPR compliance state Watch the on-demand recording: https://goo.gl/DkNq52 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/gdprdeadlinereadinessandimpacttoglobalorganizationsoutsidetheeu-180215200644-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Learn to effectively navigate the security risks, new regulations, and new technologies on your journey to a secure and compliant digital transformation with this Qualys webcast series. In this webcast, Tim White, Director of Product Management at Qualys, explained how Qualys helps customers worldwide comply with the European Union General Data Protection Regulation (GDPR). You will learn how Qualys security and compliance apps enable GDPR compliance by: Tracking and classifying the IT assets which contain EU customers personal data Providing ongoing protection of personal data across global IT environments and third parties Maintaining continuous visibility of your organizations GDPR compliance state Watch the on-demand recording: https://goo.gl/DkNq52
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations Outside the EU from Qualys
]]>
4204 6 https://cdn.slidesharecdn.com/ss_thumbnails/gdprdeadlinereadinessandimpacttoglobalorganizationsoutsidetheeu-180215200644-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Webcast Series #1: Continuous Security and Compliance Monitoring for Global IT Assets /slideshow/continuous-security-and-compliance-monitoring-for-global-it-assets/88066416 continuoussecurityandcompliancemonitoringforglobalitassets-final-cta-180215191640
Learn to effectively navigate the risks, new regulations, and new technologies on your journey to a secure and compliant digital transformation with this Qualys webcast series. In this webcast, Chris Carlson, Vice President of Product Management at Qualys, discussed how enterprises can achieve immediate visibility across on-premises, endpoint, and cloud IT environments with Qualys Cloud Platform and its powerful, natively integrated security and compliance applications. You will learn how Qualys Cloud Platform allows you to: Have all of your data analyzed in real time Respond to threats immediately See the results in one place, in just seconds Protect your digital transformation efforts Watch the on-demand recording: https://goo.gl/gC7jZR]]>

Learn to effectively navigate the risks, new regulations, and new technologies on your journey to a secure and compliant digital transformation with this Qualys webcast series. In this webcast, Chris Carlson, Vice President of Product Management at Qualys, discussed how enterprises can achieve immediate visibility across on-premises, endpoint, and cloud IT environments with Qualys Cloud Platform and its powerful, natively integrated security and compliance applications. You will learn how Qualys Cloud Platform allows you to: Have all of your data analyzed in real time Respond to threats immediately See the results in one place, in just seconds Protect your digital transformation efforts Watch the on-demand recording: https://goo.gl/gC7jZR]]>
Thu, 15 Feb 2018 19:16:40 GMT /slideshow/continuous-security-and-compliance-monitoring-for-global-it-assets/88066416 Qualys@slideshare.net(Qualys) Webcast Series #1: Continuous Security and Compliance Monitoring for Global IT Assets Qualys Learn to effectively navigate the risks, new regulations, and new technologies on your journey to a secure and compliant digital transformation with this Qualys webcast series. In this webcast, Chris Carlson, Vice President of Product Management at Qualys, discussed how enterprises can achieve immediate visibility across on-premises, endpoint, and cloud IT environments with Qualys Cloud Platform and its powerful, natively integrated security and compliance applications. You will learn how Qualys Cloud Platform allows you to: Have all of your data analyzed in real time Respond to threats immediately See the results in one place, in just seconds Protect your digital transformation efforts Watch the on-demand recording: https://goo.gl/gC7jZR <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/continuoussecurityandcompliancemonitoringforglobalitassets-final-cta-180215191640-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Learn to effectively navigate the risks, new regulations, and new technologies on your journey to a secure and compliant digital transformation with this Qualys webcast series. In this webcast, Chris Carlson, Vice President of Product Management at Qualys, discussed how enterprises can achieve immediate visibility across on-premises, endpoint, and cloud IT environments with Qualys Cloud Platform and its powerful, natively integrated security and compliance applications. You will learn how Qualys Cloud Platform allows you to: Have all of your data analyzed in real time Respond to threats immediately See the results in one place, in just seconds Protect your digital transformation efforts Watch the on-demand recording: https://goo.gl/gC7jZR
Webcast Series #1: Continuous Security and Compliance Monitoring for Global IT Assets from Qualys
]]>
3700 4 https://cdn.slidesharecdn.com/ss_thumbnails/continuoussecurityandcompliancemonitoringforglobalitassets-final-cta-180215191640-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Avoid Meltdown from the Spectre - How to measure impact and track remediation /slideshow/avoid-meltdown-from-the-spectre/86375776 avoidmeltdownfromthespectre-qualyswebcast-jan172018updated011718-180118225654
The recently disclosed Meltdown and Spectre vulnerabilities negatively impact the security of virtually every computer in the world today. These vulnerabilities allow an attacker to gain control of a computers processor and steal data located on that computer. Organizations that store data in the cloud are particularly susceptible. During this webcast, Jimmy Graham, Director of Product Management for Qualys Threat Protection and Asset Inventory, showcased solutions that can help you determine the impact of Spectre and Meltdown across your global IT environments. Understand how: To quickly and easily visualize Spectre and Meltdown vulnerabilities within your environment To track remediation progress as you patch against Spectre and Meltdown The Qualys Asset Inventory and Threat Protection apps will help you automate detection and track remediation progress Watch the on-demand webcast: https://goo.gl/6FQ6uJ]]>

The recently disclosed Meltdown and Spectre vulnerabilities negatively impact the security of virtually every computer in the world today. These vulnerabilities allow an attacker to gain control of a computers processor and steal data located on that computer. Organizations that store data in the cloud are particularly susceptible. During this webcast, Jimmy Graham, Director of Product Management for Qualys Threat Protection and Asset Inventory, showcased solutions that can help you determine the impact of Spectre and Meltdown across your global IT environments. Understand how: To quickly and easily visualize Spectre and Meltdown vulnerabilities within your environment To track remediation progress as you patch against Spectre and Meltdown The Qualys Asset Inventory and Threat Protection apps will help you automate detection and track remediation progress Watch the on-demand webcast: https://goo.gl/6FQ6uJ]]>
Thu, 18 Jan 2018 22:56:54 GMT /slideshow/avoid-meltdown-from-the-spectre/86375776 Qualys@slideshare.net(Qualys) Avoid Meltdown from the Spectre - How to measure impact and track remediation Qualys The recently disclosed Meltdown and Spectre vulnerabilities negatively impact the security of virtually every computer in the world today. These vulnerabilities allow an attacker to gain control of a computers processor and steal data located on that computer. Organizations that store data in the cloud are particularly susceptible. During this webcast, Jimmy Graham, Director of Product Management for Qualys Threat Protection and Asset Inventory, showcased solutions that can help you determine the impact of Spectre and Meltdown across your global IT environments. Understand how: To quickly and easily visualize Spectre and Meltdown vulnerabilities within your environment To track remediation progress as you patch against Spectre and Meltdown The Qualys Asset Inventory and Threat Protection apps will help you automate detection and track remediation progress Watch the on-demand webcast: https://goo.gl/6FQ6uJ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/avoidmeltdownfromthespectre-qualyswebcast-jan172018updated011718-180118225654-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The recently disclosed Meltdown and Spectre vulnerabilities negatively impact the security of virtually every computer in the world today. These vulnerabilities allow an attacker to gain control of a computers processor and steal data located on that computer. Organizations that store data in the cloud are particularly susceptible. During this webcast, Jimmy Graham, Director of Product Management for Qualys Threat Protection and Asset Inventory, showcased solutions that can help you determine the impact of Spectre and Meltdown across your global IT environments. Understand how: To quickly and easily visualize Spectre and Meltdown vulnerabilities within your environment To track remediation progress as you patch against Spectre and Meltdown The Qualys Asset Inventory and Threat Protection apps will help you automate detection and track remediation progress Watch the on-demand webcast: https://goo.gl/6FQ6uJ
Avoid Meltdown from the Spectre - How to measure impact and track remediation from Qualys
]]>
4133 4 https://cdn.slidesharecdn.com/ss_thumbnails/avoidmeltdownfromthespectre-qualyswebcast-jan172018updated011718-180118225654-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Automating Critical Security Controls for Threat Remediation and Compliance /slideshow/automating-critical-security-controls-for-threat-remediation-and-compliance/80264168 cis20cscswebcast-q32017092817-170928173509
Trends like the increased use of cloud computing by businesses and their vendors introduce new complexities in reducing risk and assessing security across the supply chain. Demonstrating continuous risk reduction and compliance with internal policies and external regulations, fixing violations and configuration drift, centrally managing exceptions, and documenting progress are all common challenges. The Center for Internet Securitys (CIS) Critical Security Controls (CSCs) were selected and prioritized by leading security experts to stop todays most common and serious cyber threats. By implementing these controls, organizations can improve their security posture and reduce the risk of threats to critical assets, data, and network infrastructure. In this webcast SANS Senior Analyst John Pescatore and Tim White, Director of Product Management for Qualys Policy Compliance (PC), discuss how you can achieve continuous security and compliance, and leverage Qualys solutions to address all 20 CSCs. The presentation encompasses: An overview of the CIS Critical Security Controls, including ongoing updates Success patterns organizations have demonstrated for using the controls to their advantage How an automation can reduce the staffing load to determine whether controls are in place and effective How to prioritize remediation efforts Real-world examples of recent attacks that leveraged misconfigured systems Watch the on-demand webcast: https://goo.gl/j6Posx]]>

Trends like the increased use of cloud computing by businesses and their vendors introduce new complexities in reducing risk and assessing security across the supply chain. Demonstrating continuous risk reduction and compliance with internal policies and external regulations, fixing violations and configuration drift, centrally managing exceptions, and documenting progress are all common challenges. The Center for Internet Securitys (CIS) Critical Security Controls (CSCs) were selected and prioritized by leading security experts to stop todays most common and serious cyber threats. By implementing these controls, organizations can improve their security posture and reduce the risk of threats to critical assets, data, and network infrastructure. In this webcast SANS Senior Analyst John Pescatore and Tim White, Director of Product Management for Qualys Policy Compliance (PC), discuss how you can achieve continuous security and compliance, and leverage Qualys solutions to address all 20 CSCs. The presentation encompasses: An overview of the CIS Critical Security Controls, including ongoing updates Success patterns organizations have demonstrated for using the controls to their advantage How an automation can reduce the staffing load to determine whether controls are in place and effective How to prioritize remediation efforts Real-world examples of recent attacks that leveraged misconfigured systems Watch the on-demand webcast: https://goo.gl/j6Posx]]>
Thu, 28 Sep 2017 17:35:08 GMT /slideshow/automating-critical-security-controls-for-threat-remediation-and-compliance/80264168 Qualys@slideshare.net(Qualys) Automating Critical Security Controls for Threat Remediation and Compliance Qualys Trends like the increased use of cloud computing by businesses and their vendors introduce new complexities in reducing risk and assessing security across the supply chain. Demonstrating continuous risk reduction and compliance with internal policies and external regulations, fixing violations and configuration drift, centrally managing exceptions, and documenting progress are all common challenges. The Center for Internet Securitys (CIS) Critical Security Controls (CSCs) were selected and prioritized by leading security experts to stop todays most common and serious cyber threats. By implementing these controls, organizations can improve their security posture and reduce the risk of threats to critical assets, data, and network infrastructure. In this webcast SANS Senior Analyst John Pescatore and Tim White, Director of Product Management for Qualys Policy Compliance (PC), discuss how you can achieve continuous security and compliance, and leverage Qualys solutions to address all 20 CSCs. The presentation encompasses: An overview of the CIS Critical Security Controls, including ongoing updates Success patterns organizations have demonstrated for using the controls to their advantage How an automation can reduce the staffing load to determine whether controls are in place and effective How to prioritize remediation efforts Real-world examples of recent attacks that leveraged misconfigured systems Watch the on-demand webcast: https://goo.gl/j6Posx <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cis20cscswebcast-q32017092817-170928173509-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Trends like the increased use of cloud computing by businesses and their vendors introduce new complexities in reducing risk and assessing security across the supply chain. Demonstrating continuous risk reduction and compliance with internal policies and external regulations, fixing violations and configuration drift, centrally managing exceptions, and documenting progress are all common challenges. The Center for Internet Securitys (CIS) Critical Security Controls (CSCs) were selected and prioritized by leading security experts to stop todays most common and serious cyber threats. By implementing these controls, organizations can improve their security posture and reduce the risk of threats to critical assets, data, and network infrastructure. In this webcast SANS Senior Analyst John Pescatore and Tim White, Director of Product Management for Qualys Policy Compliance (PC), discuss how you can achieve continuous security and compliance, and leverage Qualys solutions to address all 20 CSCs. The presentation encompasses: An overview of the CIS Critical Security Controls, including ongoing updates Success patterns organizations have demonstrated for using the controls to their advantage How an automation can reduce the staffing load to determine whether controls are in place and effective How to prioritize remediation efforts Real-world examples of recent attacks that leveraged misconfigured systems Watch the on-demand webcast: https://goo.gl/j6Posx
Automating Critical Security Controls for Threat Remediation and Compliance from Qualys
]]>
1022 5 https://cdn.slidesharecdn.com/ss_thumbnails/cis20cscswebcast-q32017092817-170928173509-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey /slideshow/security-whackamole-sans-2017-threat-landscape-survey/80148326 8-152017threatlandscapesurveywebcastcompiledfinal-170925193212
As quickly as we learn to detect new threats, the threats change like a game of Whack-a-Mole happening at an ever-increasing pace. A new survey by the SANS Institute focuses on providing valuable intelligence into the types of threats most severely impacting organizations like yours, and how those threats are evolving. In this webcast, Lee Neely, who teaches cyber security courses for SANS, Mark Butler, Chief Information Security Officer at Qualys, and other survey sponsors discuss what threat actors are currently up to and how theyre getting around existing defenses, so that you can anticipate attacks and get ahead of the attackers. Key trends discussed include: Primary vectors attackers enter through Methods attackers use most effectively as part of their layered attacks Impacts of breaches and how to remediate Best places to apply defenses Lessons learned by those who have been breached Watch the on-demand webcast: https://www.sans.org/webcasts/105430 Download the complete report: https://goo.gl/rP4KEs]]>

As quickly as we learn to detect new threats, the threats change like a game of Whack-a-Mole happening at an ever-increasing pace. A new survey by the SANS Institute focuses on providing valuable intelligence into the types of threats most severely impacting organizations like yours, and how those threats are evolving. In this webcast, Lee Neely, who teaches cyber security courses for SANS, Mark Butler, Chief Information Security Officer at Qualys, and other survey sponsors discuss what threat actors are currently up to and how theyre getting around existing defenses, so that you can anticipate attacks and get ahead of the attackers. Key trends discussed include: Primary vectors attackers enter through Methods attackers use most effectively as part of their layered attacks Impacts of breaches and how to remediate Best places to apply defenses Lessons learned by those who have been breached Watch the on-demand webcast: https://www.sans.org/webcasts/105430 Download the complete report: https://goo.gl/rP4KEs]]>
Mon, 25 Sep 2017 19:32:12 GMT /slideshow/security-whackamole-sans-2017-threat-landscape-survey/80148326 Qualys@slideshare.net(Qualys) Security Whack-a-Mole: SANS 2017 Threat Landscape Survey Qualys As quickly as we learn to detect new threats, the threats change like a game of Whack-a-Mole happening at an ever-increasing pace. A new survey by the SANS Institute focuses on providing valuable intelligence into the types of threats most severely impacting organizations like yours, and how those threats are evolving. In this webcast, Lee Neely, who teaches cyber security courses for SANS, Mark Butler, Chief Information Security Officer at Qualys, and other survey sponsors discuss what threat actors are currently up to and how theyre getting around existing defenses, so that you can anticipate attacks and get ahead of the attackers. Key trends discussed include: Primary vectors attackers enter through Methods attackers use most effectively as part of their layered attacks Impacts of breaches and how to remediate Best places to apply defenses Lessons learned by those who have been breached Watch the on-demand webcast: https://www.sans.org/webcasts/105430 Download the complete report: https://goo.gl/rP4KEs <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/8-152017threatlandscapesurveywebcastcompiledfinal-170925193212-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> As quickly as we learn to detect new threats, the threats change like a game of Whack-a-Mole happening at an ever-increasing pace. A new survey by the SANS Institute focuses on providing valuable intelligence into the types of threats most severely impacting organizations like yours, and how those threats are evolving. In this webcast, Lee Neely, who teaches cyber security courses for SANS, Mark Butler, Chief Information Security Officer at Qualys, and other survey sponsors discuss what threat actors are currently up to and how theyre getting around existing defenses, so that you can anticipate attacks and get ahead of the attackers. Key trends discussed include: Primary vectors attackers enter through Methods attackers use most effectively as part of their layered attacks Impacts of breaches and how to remediate Best places to apply defenses Lessons learned by those who have been breached Watch the on-demand webcast: https://www.sans.org/webcasts/105430 Download the complete report: https://goo.gl/rP4KEs
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey from Qualys
]]>
749 4 https://cdn.slidesharecdn.com/ss_thumbnails/8-152017threatlandscapesurveywebcastcompiledfinal-170925193212-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Qualys Corporate Brochure /slideshow/qualys-corporate-brochure-78287717/78287717 corporate-brochure-170726211615
Everything visible. Everything secure. Unparalleled visibility, end-to-end security and compliance for all your global IT assets]]>

Everything visible. Everything secure. Unparalleled visibility, end-to-end security and compliance for all your global IT assets]]>
Wed, 26 Jul 2017 21:16:14 GMT /slideshow/qualys-corporate-brochure-78287717/78287717 Qualys@slideshare.net(Qualys) Qualys Corporate Brochure Qualys Everything visible. Everything secure. Unparalleled visibility, end-to-end security and compliance for all your global IT assets <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/corporate-brochure-170726211615-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Everything visible. Everything secure. Unparalleled visibility, end-to-end security and compliance for all your global IT assets
Qualys Corporate Brochure from Qualys
]]>
12052 3 https://cdn.slidesharecdn.com/ss_thumbnails/corporate-brochure-170726211615-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Qualys Brochure for CISOs /slideshow/qualys-brochure-for-cisos/78287630 ciso-brochure-170726211318
Everything visible. Everything secure. Unparalleled 2-second visibility across all of your global IT assets on premises, endpoints and Private or Public Clouds.]]>

Everything visible. Everything secure. Unparalleled 2-second visibility across all of your global IT assets on premises, endpoints and Private or Public Clouds.]]>
Wed, 26 Jul 2017 21:13:18 GMT /slideshow/qualys-brochure-for-cisos/78287630 Qualys@slideshare.net(Qualys) Qualys Brochure for CISOs Qualys Everything visible. Everything secure. Unparalleled 2-second visibility across all of your global IT assets on premises, endpoints and Private or Public Clouds. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ciso-brochure-170726211318-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Everything visible. Everything secure. Unparalleled 2-second visibility across all of your global IT assets on premises, endpoints and Private or Public Clouds.
Qualys Brochure for CISOs from Qualys
]]>
11871 4 https://cdn.slidesharecdn.com/ss_thumbnails/ciso-brochure-170726211318-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Securing Your Public Cloud Infrastructure /slideshow/securing-your-public-cloud-infrastructure/78102738 securingpubliccloudsinfrawithqualysjuly2017final-170720221353
Public cloud providers operate on a shared responsibility model, which places the onus on the customer to define and secure the data and applications that are hosted within cloud infrastructure. To that end, it is critical that organizations accurately and selectively pinpoint which cloud workloads and virtual IT assets must be monitored, updated and patched based on developing threats to customer data and applications. In this webcast, Mark Butler, Chief Information Security Officer at Qualys, and Hari Srinivasan, Director of Product Management for Qualys Cloud and Virtualization Security detail how you can gain complete visibility of your organizations entire cloud asset inventory and security posture to help you keep up with shared security responsibility models across public cloud infrastructure. The presentation covers: Challenges surrounding increased migration to public clouds Using automation for secure DevOps How to ensure effective and efficient operations To watch the on-demand webcast, visit https://lps.qualys.com/securing-your-public-cloud-infrastructure.html]]>

Public cloud providers operate on a shared responsibility model, which places the onus on the customer to define and secure the data and applications that are hosted within cloud infrastructure. To that end, it is critical that organizations accurately and selectively pinpoint which cloud workloads and virtual IT assets must be monitored, updated and patched based on developing threats to customer data and applications. In this webcast, Mark Butler, Chief Information Security Officer at Qualys, and Hari Srinivasan, Director of Product Management for Qualys Cloud and Virtualization Security detail how you can gain complete visibility of your organizations entire cloud asset inventory and security posture to help you keep up with shared security responsibility models across public cloud infrastructure. The presentation covers: Challenges surrounding increased migration to public clouds Using automation for secure DevOps How to ensure effective and efficient operations To watch the on-demand webcast, visit https://lps.qualys.com/securing-your-public-cloud-infrastructure.html]]>
Thu, 20 Jul 2017 22:13:53 GMT /slideshow/securing-your-public-cloud-infrastructure/78102738 Qualys@slideshare.net(Qualys) Securing Your Public Cloud Infrastructure Qualys Public cloud providers operate on a shared responsibility model, which places the onus on the customer to define and secure the data and applications that are hosted within cloud infrastructure. To that end, it is critical that organizations accurately and selectively pinpoint which cloud workloads and virtual IT assets must be monitored, updated and patched based on developing threats to customer data and applications. In this webcast, Mark Butler, Chief Information Security Officer at Qualys, and Hari Srinivasan, Director of Product Management for Qualys Cloud and Virtualization Security detail how you can gain complete visibility of your organizations entire cloud asset inventory and security posture to help you keep up with shared security responsibility models across public cloud infrastructure. The presentation covers: Challenges surrounding increased migration to public clouds Using automation for secure DevOps How to ensure effective and efficient operations To watch the on-demand webcast, visit https://lps.qualys.com/securing-your-public-cloud-infrastructure.html <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securingpubliccloudsinfrawithqualysjuly2017final-170720221353-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Public cloud providers operate on a shared responsibility model, which places the onus on the customer to define and secure the data and applications that are hosted within cloud infrastructure. To that end, it is critical that organizations accurately and selectively pinpoint which cloud workloads and virtual IT assets must be monitored, updated and patched based on developing threats to customer data and applications. In this webcast, Mark Butler, Chief Information Security Officer at Qualys, and Hari Srinivasan, Director of Product Management for Qualys Cloud and Virtualization Security detail how you can gain complete visibility of your organizations entire cloud asset inventory and security posture to help you keep up with shared security responsibility models across public cloud infrastructure. The presentation covers: Challenges surrounding increased migration to public clouds Using automation for secure DevOps How to ensure effective and efficient operations To watch the on-demand webcast, visit https://lps.qualys.com/securing-your-public-cloud-infrastructure.html
Securing Your Public Cloud Infrastructure from Qualys
]]>
4426 10 https://cdn.slidesharecdn.com/ss_thumbnails/securingpubliccloudsinfrawithqualysjuly2017final-170720221353-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to Rapidly Identify Assets at Risk to WannaCry Ransomware /slideshow/how-to-rapidly-identify-assets-at-risk-to-wannacry-ransomware/76072700 wannacrywebcastpresentation051717-170517213934
A major ransomware attack using a leaked NSA exploit known as WannaCry has hit more than 150 countries since May 12. More than 200,000 infections globally have been detected and the attack, which uses the WannaCry (WanaCrypt0r 2.0) ransomware, continues to spread. WannaCry utilizes the ETERNALBLUE exploit targeting newly disclosed vulnerabilities (MS17-010). Once leaked, it took only 28 days for this exploit to be used in a full-scale cyber attack. Organizations that scan for vulnerabilities only monthly or less frequently can still be at risk. During this webcast (https://www.brighttalk.com/webcast/11673/261293) Mark Butler, CISO at Qualys and Jimmy Graham, Director of Product Management for Qualys ThreatPROTECT and AssetView, show you how to: Patch and implement other mitigations for WannaCry Detect and get full visibility on impacted assets for prompt remediation Institute threat-prioritized remediation processes to mitigate current and future risks Qualys ThreatPROTECT can detect and identify patches for the vulnerabilities being exploited by ETERNALBLUE and shield your organizations business-critical data from attacks. Sign up for a free 30 day trial and get unlimited scans. https://qualys.com/wannacry-trial]]>

A major ransomware attack using a leaked NSA exploit known as WannaCry has hit more than 150 countries since May 12. More than 200,000 infections globally have been detected and the attack, which uses the WannaCry (WanaCrypt0r 2.0) ransomware, continues to spread. WannaCry utilizes the ETERNALBLUE exploit targeting newly disclosed vulnerabilities (MS17-010). Once leaked, it took only 28 days for this exploit to be used in a full-scale cyber attack. Organizations that scan for vulnerabilities only monthly or less frequently can still be at risk. During this webcast (https://www.brighttalk.com/webcast/11673/261293) Mark Butler, CISO at Qualys and Jimmy Graham, Director of Product Management for Qualys ThreatPROTECT and AssetView, show you how to: Patch and implement other mitigations for WannaCry Detect and get full visibility on impacted assets for prompt remediation Institute threat-prioritized remediation processes to mitigate current and future risks Qualys ThreatPROTECT can detect and identify patches for the vulnerabilities being exploited by ETERNALBLUE and shield your organizations business-critical data from attacks. Sign up for a free 30 day trial and get unlimited scans. https://qualys.com/wannacry-trial]]>
Wed, 17 May 2017 21:39:34 GMT /slideshow/how-to-rapidly-identify-assets-at-risk-to-wannacry-ransomware/76072700 Qualys@slideshare.net(Qualys) How to Rapidly Identify Assets at Risk to WannaCry Ransomware Qualys A major ransomware attack using a leaked NSA exploit known as WannaCry has hit more than 150 countries since May 12. More than 200,000 infections globally have been detected and the attack, which uses the WannaCry (WanaCrypt0r 2.0) ransomware, continues to spread. WannaCry utilizes the ETERNALBLUE exploit targeting newly disclosed vulnerabilities (MS17-010). Once leaked, it took only 28 days for this exploit to be used in a full-scale cyber attack. Organizations that scan for vulnerabilities only monthly or less frequently can still be at risk. During this webcast (https://www.brighttalk.com/webcast/11673/261293) Mark Butler, CISO at Qualys and Jimmy Graham, Director of Product Management for Qualys ThreatPROTECT and AssetView, show you how to: Patch and implement other mitigations for WannaCry Detect and get full visibility on impacted assets for prompt remediation Institute threat-prioritized remediation processes to mitigate current and future risks Qualys ThreatPROTECT can detect and identify patches for the vulnerabilities being exploited by ETERNALBLUE and shield your organizations business-critical data from attacks. Sign up for a free 30 day trial and get unlimited scans. https://qualys.com/wannacry-trial <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/wannacrywebcastpresentation051717-170517213934-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A major ransomware attack using a leaked NSA exploit known as WannaCry has hit more than 150 countries since May 12. More than 200,000 infections globally have been detected and the attack, which uses the WannaCry (WanaCrypt0r 2.0) ransomware, continues to spread. WannaCry utilizes the ETERNALBLUE exploit targeting newly disclosed vulnerabilities (MS17-010). Once leaked, it took only 28 days for this exploit to be used in a full-scale cyber attack. Organizations that scan for vulnerabilities only monthly or less frequently can still be at risk. During this webcast (https://www.brighttalk.com/webcast/11673/261293) Mark Butler, CISO at Qualys and Jimmy Graham, Director of Product Management for Qualys ThreatPROTECT and AssetView, show you how to: Patch and implement other mitigations for WannaCry Detect and get full visibility on impacted assets for prompt remediation Institute threat-prioritized remediation processes to mitigate current and future risks Qualys ThreatPROTECT can detect and identify patches for the vulnerabilities being exploited by ETERNALBLUE and shield your organizations business-critical data from attacks. Sign up for a free 30 day trial and get unlimited scans. https://qualys.com/wannacry-trial
How to Rapidly Identify Assets at Risk to WannaCry Ransomware from Qualys
]]>
716 4 https://cdn.slidesharecdn.com/ss_thumbnails/wannacrywebcastpresentation051717-170517213934-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Web App Attacks - Stats & Remediation /slideshow/web-app-attacks-stats-remediation/75793771 quwaswafeblast050217-170508213023
Application security is an expensive, daunting challenge. Simplify with integrated Qualys Web Application Scanning (WAS) and Web Application Firewall (WAF). With integrated WAS/WAF, you can: Detect web application vulnerabilities with WAS, and get rapid protection from attacks with WAF all from a single console Address vulnerabilities discovered by WAS with one-click creation of virtual patch rules in WAF Use WAS scans to evaluate WAF security policies Scale seamlessly from a handful of apps to thousands Learn more and get a free trial at qualys.com/OneClick]]>

Application security is an expensive, daunting challenge. Simplify with integrated Qualys Web Application Scanning (WAS) and Web Application Firewall (WAF). With integrated WAS/WAF, you can: Detect web application vulnerabilities with WAS, and get rapid protection from attacks with WAF all from a single console Address vulnerabilities discovered by WAS with one-click creation of virtual patch rules in WAF Use WAS scans to evaluate WAF security policies Scale seamlessly from a handful of apps to thousands Learn more and get a free trial at qualys.com/OneClick]]>
Mon, 08 May 2017 21:30:23 GMT /slideshow/web-app-attacks-stats-remediation/75793771 Qualys@slideshare.net(Qualys) Web App Attacks - Stats & Remediation Qualys Application security is an expensive, daunting challenge. Simplify with integrated Qualys Web Application Scanning (WAS) and Web Application Firewall (WAF). With integrated WAS/WAF, you can: Detect web application vulnerabilities with WAS, and get rapid protection from attacks with WAF all from a single console Address vulnerabilities discovered by WAS with one-click creation of virtual patch rules in WAF Use WAS scans to evaluate WAF security policies Scale seamlessly from a handful of apps to thousands Learn more and get a free trial at qualys.com/OneClick <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/quwaswafeblast050217-170508213023-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Application security is an expensive, daunting challenge. Simplify with integrated Qualys Web Application Scanning (WAS) and Web Application Firewall (WAF). With integrated WAS/WAF, you can: Detect web application vulnerabilities with WAS, and get rapid protection from attacks with WAF all from a single console Address vulnerabilities discovered by WAS with one-click creation of virtual patch rules in WAF Use WAS scans to evaluate WAF security policies Scale seamlessly from a handful of apps to thousands Learn more and get a free trial at qualys.com/OneClick
Web App Attacks - Stats & Remediation from Qualys
]]>
13456 4 https://cdn.slidesharecdn.com/ss_thumbnails/quwaswafeblast050217-170508213023-thumbnail.jpg?width=120&height=120&fit=bounds infographic Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Gain Visibility & Control of IT Assets in a Perimeterless World /slideshow/gain-visibility-control-of-it-assets-in-a-perimeterless-world/75718008 avwebcastpresentation5-4-17-170505182853
In todays perimeterless world, enterprise security teams are challenged with maintaining visibility and control over the exploding number of assets on their networks. The IT assets that pose the greatest risk to your organizations security are the ones you dont know are there. Without knowledge of which software and devices exist in your network whether on-premises, on endpoints, or in elastic clouds InfoSec professionals are unable to enact proper security and protection. During this webcast, Jimmy Graham, Director of Product Management for Qualys AssetView and Darron Gibbard, Chief Technical Security Officer for Qualys EMEA, cover the six key elements of an ideal cloud-based IT asset inventory system: 1. Complete visibility of your IT environment 2. Deep visibility into assets 3. Continuous and automatic updates 4. Asset criticality ranking 5. Interactive, customizable dashboarding and reporting 6. Integration with your CMDB Those of you in Europe will also be interested to learn about asset inventory for GDPR compliance. Watch the on-demand webcast: https://www.brighttalk.com/webcast/11673/255291 Read the whitepaper, Cloud-Based IT Asset Inventory: A Solid Foundation for InfoSec Infrastructure: https://www.qualys.com/forms/whitepapers/cloud-based-it-asset-inventory-solid-foundation-infosec-infrastructure/ Free trial of Qualys AssetView: https://www.qualys.com/forms/assetview/ Contact Qualys for more information: 800.745.4355 https://www.qualys.com/company/contacts]]>

In todays perimeterless world, enterprise security teams are challenged with maintaining visibility and control over the exploding number of assets on their networks. The IT assets that pose the greatest risk to your organizations security are the ones you dont know are there. Without knowledge of which software and devices exist in your network whether on-premises, on endpoints, or in elastic clouds InfoSec professionals are unable to enact proper security and protection. During this webcast, Jimmy Graham, Director of Product Management for Qualys AssetView and Darron Gibbard, Chief Technical Security Officer for Qualys EMEA, cover the six key elements of an ideal cloud-based IT asset inventory system: 1. Complete visibility of your IT environment 2. Deep visibility into assets 3. Continuous and automatic updates 4. Asset criticality ranking 5. Interactive, customizable dashboarding and reporting 6. Integration with your CMDB Those of you in Europe will also be interested to learn about asset inventory for GDPR compliance. Watch the on-demand webcast: https://www.brighttalk.com/webcast/11673/255291 Read the whitepaper, Cloud-Based IT Asset Inventory: A Solid Foundation for InfoSec Infrastructure: https://www.qualys.com/forms/whitepapers/cloud-based-it-asset-inventory-solid-foundation-infosec-infrastructure/ Free trial of Qualys AssetView: https://www.qualys.com/forms/assetview/ Contact Qualys for more information: 800.745.4355 https://www.qualys.com/company/contacts]]>
Fri, 05 May 2017 18:28:53 GMT /slideshow/gain-visibility-control-of-it-assets-in-a-perimeterless-world/75718008 Qualys@slideshare.net(Qualys) Gain Visibility & Control of IT Assets in a Perimeterless World Qualys In todays perimeterless world, enterprise security teams are challenged with maintaining visibility and control over the exploding number of assets on their networks. The IT assets that pose the greatest risk to your organizations security are the ones you dont know are there. Without knowledge of which software and devices exist in your network whether on-premises, on endpoints, or in elastic clouds InfoSec professionals are unable to enact proper security and protection. During this webcast, Jimmy Graham, Director of Product Management for Qualys AssetView and Darron Gibbard, Chief Technical Security Officer for Qualys EMEA, cover the six key elements of an ideal cloud-based IT asset inventory system: 1. Complete visibility of your IT environment 2. Deep visibility into assets 3. Continuous and automatic updates 4. Asset criticality ranking 5. Interactive, customizable dashboarding and reporting 6. Integration with your CMDB Those of you in Europe will also be interested to learn about asset inventory for GDPR compliance. Watch the on-demand webcast: https://www.brighttalk.com/webcast/11673/255291 Read the whitepaper, Cloud-Based IT Asset Inventory: A Solid Foundation for InfoSec Infrastructure: https://www.qualys.com/forms/whitepapers/cloud-based-it-asset-inventory-solid-foundation-infosec-infrastructure/ Free trial of Qualys AssetView: https://www.qualys.com/forms/assetview/ Contact Qualys for more information: 800.745.4355 https://www.qualys.com/company/contacts <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/avwebcastpresentation5-4-17-170505182853-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In todays perimeterless world, enterprise security teams are challenged with maintaining visibility and control over the exploding number of assets on their networks. The IT assets that pose the greatest risk to your organizations security are the ones you dont know are there. Without knowledge of which software and devices exist in your network whether on-premises, on endpoints, or in elastic clouds InfoSec professionals are unable to enact proper security and protection. During this webcast, Jimmy Graham, Director of Product Management for Qualys AssetView and Darron Gibbard, Chief Technical Security Officer for Qualys EMEA, cover the six key elements of an ideal cloud-based IT asset inventory system: 1. Complete visibility of your IT environment 2. Deep visibility into assets 3. Continuous and automatic updates 4. Asset criticality ranking 5. Interactive, customizable dashboarding and reporting 6. Integration with your CMDB Those of you in Europe will also be interested to learn about asset inventory for GDPR compliance. Watch the on-demand webcast: https://www.brighttalk.com/webcast/11673/255291 Read the whitepaper, Cloud-Based IT Asset Inventory: A Solid Foundation for InfoSec Infrastructure: https://www.qualys.com/forms/whitepapers/cloud-based-it-asset-inventory-solid-foundation-infosec-infrastructure/ Free trial of Qualys AssetView: https://www.qualys.com/forms/assetview/ Contact Qualys for more information: 800.745.4355 https://www.qualys.com/company/contacts
Gain Visibility & Control of IT Assets in a Perimeterless World from Qualys
]]>
478 2 https://cdn.slidesharecdn.com/ss_thumbnails/avwebcastpresentation5-4-17-170505182853-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-Qualys-48x48.jpg?cb=1548799512 Qualys is the leading provider of cloud-based security and compliance solutions, including asset discovery, network security, threat protection, compliance monitoring and web application security. www.qualys.com https://cdn.slidesharecdn.com/ss_thumbnails/gdprdeadlinereadinessandimpacttoglobalorganizationsoutsidetheeu-180215200644-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/gdpr-deadline-readiness-and-impact-to-global-organizations-outside-the-eu/88068928 Webcast Series #3: GDP... https://cdn.slidesharecdn.com/ss_thumbnails/continuoussecurityandcompliancemonitoringforglobalitassets-final-cta-180215191640-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/continuous-security-and-compliance-monitoring-for-global-it-assets/88066416 Webcast Series #1: Con... https://cdn.slidesharecdn.com/ss_thumbnails/avoidmeltdownfromthespectre-qualyswebcast-jan172018updated011718-180118225654-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/avoid-meltdown-from-the-spectre/86375776 Avoid Meltdown from th...