Hi [[ session.user.profile.firstName ]]

Qualys Webcasts

  • Date
  • Rating
  • Views
  • Excel at Your Security Assessments Without EXCEL Spreadsheets Excel at Your Security Assessments Without EXCEL Spreadsheets Tim White, Director of Product Management, Qualys and Hariom Singh, Subject Matter Expert, Qualys Recorded: Sep 13 2016 61 mins
    Third-parties, partners and vendors with access to your networks and data make your organization vulnerable to breaches. Clearly, your business needs to work with third parties, but you don’t want your company to fall victim to data theft, brand damage, and possible government fines as a result, so you have to take third-party and vendor assessment very seriously.

    With Qualys Security Assessment Questionnaire (SAQ) you can expand the scope of risk and compliance data beyond technical vulnerabilities to verify that third-party vendors are in compliance with emerging regulatory requirements. By automating a traditionally manual process, Qualys SAQ frees you from unreliable and labor-intensive approaches such as email and spreadsheets.

    Join our complimentary webcast to learn how Qualys SAQ can help with:

    * Third-Party risk assessment
    * Internal Audit Management
    * Security Training and Awareness
    * End-to-End security compliance

    This webcast includes a live demo and a Q&A.
  • Improving on "Whack-a-Mole" Vulnerability Management Improving on "Whack-a-Mole" Vulnerability Management Joseph Blankenship Senior Analyst, Forrester & Jimmy Graham Director, Product Management, Qualys Recorded: Aug 18 2016 50 mins
    The need to prioritize vulnerability management (VM) is greater than ever as IT security teams become overwhelmed with trying to protect against every threat that pops up. Organizations that understand the varying risks across vulnerabilities can focus on resolving dangerous exploitation, and avoid wasting crucial time addressing insignificant ones.

    We invite you to attend the “Improving on 'Whack-a-Mole' Vulnerability Management” webcast featuring guest speaker Joseph Blankenship, Senior Analyst at Forrester, and Jimmy Graham, Director of Product Management at Qualys.

    The following topics will be discussed during the webcast:

    * Forrester data trends and insights from real-world client scenarios

    * Why vulnerability management needs to be prioritized and elevated

    * How Qualys ThreatPROTECT shows you what to remediate first (led by Qualys)


    This webcast includes a live Q&A.
  • Prioritize and Remediate your Vulnerabilities with Qualys ThreatPROTECT Prioritize and Remediate your Vulnerabilities with Qualys ThreatPROTECT Wolfgang Kandek, CTO, Qualys and Tim White Director, Product Management, Qualys Recorded: Jun 23 2016 61 mins
    Dealing with a large number of IT vulnerabilities is an issue for most organizations. Only 10 Common Vulnerabilities and Exposures (CVEs) account for 97% of the exploits*. Clearly, it is vital for you to identify which of your vulnerabilities are the most critical to address first with fast, effective remediation.

    Qualys’ newest solution ThreatPROTECT correlates vulnerability data with a Live Threat Intelligence Feed from multiple industry sources, providing customers with an easy-to-understand dashboard that provides clear insight into which vulnerabilities to fix first.

    During this webcast presenters Wolfgang Kandek, and Tim White, will show you how you can use ThreatPROTECT to:

    * Quickly identify your most important assets and critical vulnerabilities

    * Prioritize remediation efforts so you know which vulnerabilities to tackle first

    * Eliminate the guesswork with real-time correlation of active threats

    This webcast includes a live demo and a Q&A.
  • Vulnerability Detection in Today's Mobile Workforce Vulnerability Detection in Today's Mobile Workforce Corey Reed, Sr. Information Security Analyst, Synovus Bank and Wolfgang Kandek, CTO, Qualys Recorded: May 17 2016 60 mins
    As a security professional, getting to know your current vulnerability data from your mobile workforce is a difficult task. If the mobile devices are not on the network at the time of your scan, or if you do not schedule a scan for the devices specifically, your data could become out of date by weeks or even months.

    During this webcast, Corey Reed from Synovus Bank and Wolfgang Kandek from Qualys will discuss how Qualys Cloud Agent has helped Synovus Bank to:

    * Perform frequent vulnerability scans for all internal and external assets.

    * Receive faster notification and remediation for zero day and critical threats.

    * Improve their vulnerability analysis and security patching programs by providing data that can be used to prioritize patch distribution.
  • Detect All Your IT Assets in SECONDS Detect All Your IT Assets in SECONDS Wolfgang Kandek, CTO, Qualys Recorded: Apr 5 2016 59 mins
    The foundation of security is control. But how do you control what you can't search?

    A huge hurdle to protecting your network is knowing exactly what devices are connected. It’s increasingly difficult for organizations to know what IT assets exist in their environment, where they’re located, who manages them and their associated security risks.

    Learn how Qualys AssetView quickly gives your IT and security teams a complete, accurate view of all IT assets in your environment via your favorite web browser.

    Reserve your seat for this webcast so you can discover how to:

    * Run instant queries that return results in seconds
    * Search for OS and App configuration information on all your assets for fast, accurate and actionable data
    * Get a unified view of your IT and Security data
  • Visibility and Actionable Data Across Millions of IT Assets in Seconds Visibility and Actionable Data Across Millions of IT Assets in Seconds Wolfgang Kandek, CTO, Qualys and Tim White, Director of Product Management, Qualys Recorded: Feb 23 2016 59 mins
    Knowing what IT assets you have and how to protect them is increasingly a challenge as globalization, virtualization and mobile assets create new endpoints and new opportunities for hackers to infiltrate. Now you can move beyond traditional scanner-based approaches to strengthen endpoint security with a free solution from Qualys.

    Discover how the Qualys AssetView gives you a fast, actionable view of all IT assets while helping to:

    > Gain comprehensive, scalable and always up-to-date view of endpoints — with continuously updated inventory of asset details, scaling to millions of assets

    > Deliver fast, accurate and actionable data — with a new layer of intelligence into the current state of endpoints, including details about services, file systems and registries as well as information to manage and secure systems

    > Minimize impact on systems and networks — by keeping itself lightweight and up-to-date to eliminate the need to reboot

    > Handle virtualized environments with ease — by keeping track of the constant proliferation of images inside and outside of the environment
  • Mastering Vulnerability Management with A Risk-based Approach Mastering Vulnerability Management with A Risk-based Approach John Haberland Dir. Strategic Alliances, Qualys and Syed Abdur Rahman Sr. Product Manager, Brinqa Recorded: Jan 27 2016 63 mins
    To effectively prioritize and remediate the most critical vulnerabilities threatening your organization, you need to combine internal asset risk evaluation with external real-time exploit and threat intelligence to create the most accurate picture of incidence and impact.

    Join this webcast to learn how Qualys and Brinqa provide all the tools you need to dramatically improve the effectiveness and performance of your vulnerability management program, including :

    * Leveraging asset risk and context during vulnerability prioritization

    * Effective remediation through automated, risk-centric remediation policies

    * Business risk and exposure reporting for primary stakeholders
  • Cloud Without Borders - High-confidence, Secure Computing: Anytime & Anywhere Cloud Without Borders - High-confidence, Secure Computing: Anytime & Anywhere Wolfgang Kandek, CTO, Qualys Recorded: Jan 20 2016 59 mins
    Powerful technologies from the core to the edge are enabling new insights and transforming value creation. But these opportunities create new risks and urgently beg for innovative approaches to securing our most precious information. Learn how a new architecture of cloud security expertise, endpoints and apps will enable high-confidence computing and deliver security and privacy anywhere, anytime.
  • Mastering Vulnerability Management with A Risk-based Approach Mastering Vulnerability Management with A Risk-based Approach John Haberland Dir. Strategic Alliances, Qualys and Syed Abdur Rahman Sr. Product Manager, Brinqa Recorded: Dec 15 2015 63 mins
    To effectively prioritize and remediate the most critical vulnerabilities threatening your organization, you need to combine internal asset risk evaluation with external real-time exploit and threat intelligence to create the most accurate picture of incidence and impact.

    Join this webcast to learn how Qualys and Brinqa provide all the tools you need to dramatically improve the effectiveness and performance of your vulnerability management program, including :

    * Leveraging asset risk and context during vulnerability prioritization

    * Effective remediation through automated, risk-centric remediation policies

    * Business risk and exposure reporting for primary stakeholders
  • The ABCs of The Pragmatic CISO: Assets, Borderless-ness and Compliance The ABCs of The Pragmatic CISO: Assets, Borderless-ness and Compliance Wolfgang Kandek, CTO, Qualys and Mike Rothman, Analyst & President, Securosis Recorded: Dec 10 2015 60 mins
    With cyber security taking the front seat in the boardroom, CISOs now have more visibility than ever before. But, many are struggling to gain the visibility they need to be effective and searching for practical techniques to gain full control over their assets for continuous security and compliance.

    Join this webcast where we'll cover the ABCs of being a pragmatic CISO.

    * Assets — discover, assess, categorize, and secure assets across clouds and networks

    * Borderless-ness — apply controls that remain effective across borders (e.g. on the endpoint)

    * Compliance — achieve continuous and demonstrable compliance with PCI, HIPAA, NIST, and more

Embed in website or blog