Hi [[ session.user.profile.firstName ]]

Qualys Webcasts

  • Date
  • Rating
  • Views
  • Securing Your Web Apps in Today's Complex Cloud Environment Securing Your Web Apps in Today's Complex Cloud Environment Alex Jones, Security Engineer, Gainsight & Dave Ferguson, Solution Architect, Qualys Recorded: Nov 1 2016 58 mins
    Today, securing web applications has become more complex as organizations increasingly deploy and manage their web applications in the cloud. Modern web technologies such as sophisticated JavaScript frameworks and SPAs present increasing challenges to web application scanning, as crawling has become more difficult to manage.

    During this webcast Alex Jones from Gainsight and Dave Ferguson from Qualys will discuss how Qualys has helped Gainsight to:

    - Scan, discover, catalog applications on multiple cloud environments for vulnerabilities and website misconfigurations.

    - Adapt to increasingly complex and new web application technologies.

    - Build an easy-to-use, accurate and scalable scanning program across web application and network infrastructure.
  • Overcome Outdated Processes and Automate IT Risk & Compliance Overcome Outdated Processes and Automate IT Risk & Compliance Nick Hayes, Analyst at Forrester, Josh Hankins, Information Security Solutions Manager at 84.51° Recorded: Oct 6 2016 58 mins
    Companies across a wide gamut of industries and regions all strive to effectively manage risk and compliance, but too few actually achieve it. As IT, business, and regulatory environments grow increasingly complex, risk and compliance pros must move past outdated processes and legacy systems to innovate and find ways to achieve higher degrees of efficiency and oversight.

    During this webcast, guest speakers Nick Hayes, Analyst at Forrester, and Josh Hankins, Information Security Solutions Manager at 84.51° will cover how you can:

    · Move up the maturity curve through better program coordination and technology integration.
    · Establish the right metrics to build the business case and showcase continual progress.
    · Bolster future success by prioritizing business agility and data mastery as top strategic objectives.

    This Webcast will have a Live Q&A
  • Excel at Your Security Assessments Without EXCEL Spreadsheets Excel at Your Security Assessments Without EXCEL Spreadsheets Tim White, Director of Product Management, Qualys and Hariom Singh, Subject Matter Expert, Qualys Recorded: Sep 13 2016 61 mins
    Third-parties, partners and vendors with access to your networks and data make your organization vulnerable to breaches. Clearly, your business needs to work with third parties, but you don’t want your company to fall victim to data theft, brand damage, and possible government fines as a result, so you have to take third-party and vendor assessment very seriously.

    With Qualys Security Assessment Questionnaire (SAQ) you can expand the scope of risk and compliance data beyond technical vulnerabilities to verify that third-party vendors are in compliance with emerging regulatory requirements. By automating a traditionally manual process, Qualys SAQ frees you from unreliable and labor-intensive approaches such as email and spreadsheets.

    Join our complimentary webcast to learn how Qualys SAQ can help with:

    * Third-Party risk assessment
    * Internal Audit Management
    * Security Training and Awareness
    * End-to-End security compliance

    This webcast includes a live demo and a Q&A.
  • Improving on "Whack-a-Mole" Vulnerability Management Improving on "Whack-a-Mole" Vulnerability Management Joseph Blankenship Senior Analyst, Forrester & Jimmy Graham Director, Product Management, Qualys Recorded: Aug 18 2016 50 mins
    The need to prioritize vulnerability management (VM) is greater than ever as IT security teams become overwhelmed with trying to protect against every threat that pops up. Organizations that understand the varying risks across vulnerabilities can focus on resolving dangerous exploitation, and avoid wasting crucial time addressing insignificant ones.

    We invite you to attend the “Improving on 'Whack-a-Mole' Vulnerability Management” webcast featuring guest speaker Joseph Blankenship, Senior Analyst at Forrester, and Jimmy Graham, Director of Product Management at Qualys.

    The following topics will be discussed during the webcast:

    * Forrester data trends and insights from real-world client scenarios

    * Why vulnerability management needs to be prioritized and elevated

    * How Qualys ThreatPROTECT shows you what to remediate first (led by Qualys)


    This webcast includes a live Q&A.
  • Prioritize and Remediate your Vulnerabilities with Qualys ThreatPROTECT Prioritize and Remediate your Vulnerabilities with Qualys ThreatPROTECT Wolfgang Kandek, CTO, Qualys and Tim White Director, Product Management, Qualys Recorded: Jun 23 2016 61 mins
    Dealing with a large number of IT vulnerabilities is an issue for most organizations. Only 10 Common Vulnerabilities and Exposures (CVEs) account for 97% of the exploits*. Clearly, it is vital for you to identify which of your vulnerabilities are the most critical to address first with fast, effective remediation.

    Qualys’ newest solution ThreatPROTECT correlates vulnerability data with a Live Threat Intelligence Feed from multiple industry sources, providing customers with an easy-to-understand dashboard that provides clear insight into which vulnerabilities to fix first.

    During this webcast presenters Wolfgang Kandek, and Tim White, will show you how you can use ThreatPROTECT to:

    * Quickly identify your most important assets and critical vulnerabilities

    * Prioritize remediation efforts so you know which vulnerabilities to tackle first

    * Eliminate the guesswork with real-time correlation of active threats

    This webcast includes a live demo and a Q&A.
  • Vulnerability Detection in Today's Mobile Workforce Vulnerability Detection in Today's Mobile Workforce Corey Reed, Sr. Information Security Analyst, Synovus Bank and Wolfgang Kandek, CTO, Qualys Recorded: May 17 2016 60 mins
    As a security professional, getting to know your current vulnerability data from your mobile workforce is a difficult task. If the mobile devices are not on the network at the time of your scan, or if you do not schedule a scan for the devices specifically, your data could become out of date by weeks or even months.

    During this webcast, Corey Reed from Synovus Bank and Wolfgang Kandek from Qualys will discuss how Qualys Cloud Agent has helped Synovus Bank to:

    * Perform frequent vulnerability scans for all internal and external assets.

    * Receive faster notification and remediation for zero day and critical threats.

    * Improve their vulnerability analysis and security patching programs by providing data that can be used to prioritize patch distribution.
  • Detect All Your IT Assets in SECONDS Detect All Your IT Assets in SECONDS Wolfgang Kandek, CTO, Qualys Recorded: Apr 5 2016 59 mins
    The foundation of security is control. But how do you control what you can't search?

    A huge hurdle to protecting your network is knowing exactly what devices are connected. It’s increasingly difficult for organizations to know what IT assets exist in their environment, where they’re located, who manages them and their associated security risks.

    Learn how Qualys AssetView quickly gives your IT and security teams a complete, accurate view of all IT assets in your environment via your favorite web browser.

    Reserve your seat for this webcast so you can discover how to:

    * Run instant queries that return results in seconds
    * Search for OS and App configuration information on all your assets for fast, accurate and actionable data
    * Get a unified view of your IT and Security data
  • Visibility and Actionable Data Across Millions of IT Assets in Seconds Visibility and Actionable Data Across Millions of IT Assets in Seconds Wolfgang Kandek, CTO, Qualys and Tim White, Director of Product Management, Qualys Recorded: Feb 23 2016 59 mins
    Knowing what IT assets you have and how to protect them is increasingly a challenge as globalization, virtualization and mobile assets create new endpoints and new opportunities for hackers to infiltrate. Now you can move beyond traditional scanner-based approaches to strengthen endpoint security with a free solution from Qualys.

    Discover how the Qualys AssetView gives you a fast, actionable view of all IT assets while helping to:

    > Gain comprehensive, scalable and always up-to-date view of endpoints — with continuously updated inventory of asset details, scaling to millions of assets

    > Deliver fast, accurate and actionable data — with a new layer of intelligence into the current state of endpoints, including details about services, file systems and registries as well as information to manage and secure systems

    > Minimize impact on systems and networks — by keeping itself lightweight and up-to-date to eliminate the need to reboot

    > Handle virtualized environments with ease — by keeping track of the constant proliferation of images inside and outside of the environment
  • Mastering Vulnerability Management with A Risk-based Approach Mastering Vulnerability Management with A Risk-based Approach John Haberland Dir. Strategic Alliances, Qualys and Syed Abdur Rahman Sr. Product Manager, Brinqa Recorded: Jan 27 2016 63 mins
    To effectively prioritize and remediate the most critical vulnerabilities threatening your organization, you need to combine internal asset risk evaluation with external real-time exploit and threat intelligence to create the most accurate picture of incidence and impact.

    Join this webcast to learn how Qualys and Brinqa provide all the tools you need to dramatically improve the effectiveness and performance of your vulnerability management program, including :

    * Leveraging asset risk and context during vulnerability prioritization

    * Effective remediation through automated, risk-centric remediation policies

    * Business risk and exposure reporting for primary stakeholders
  • Cloud Without Borders - High-confidence, Secure Computing: Anytime & Anywhere Cloud Without Borders - High-confidence, Secure Computing: Anytime & Anywhere Wolfgang Kandek, CTO, Qualys Recorded: Jan 20 2016 59 mins
    Powerful technologies from the core to the edge are enabling new insights and transforming value creation. But these opportunities create new risks and urgently beg for innovative approaches to securing our most precious information. Learn how a new architecture of cloud security expertise, endpoints and apps will enable high-confidence computing and deliver security and privacy anywhere, anytime.