Hi [[ session.user.profile.firstName ]]

Qualys Webcasts

  • Date
  • Rating
  • Views
  • Building Security into the 3 Phases of Container Deployment
    Building Security into the 3 Phases of Container Deployment Hari Srinivasan, Director of Product Management Recorded: Aug 2 2018 60 mins
    Containers are the most sought after development tool for microservices. Their simplicity and portability allow DevOps to create true agile builds within development cycles. However, this new kind of environment brings new set of security threats at every phase of this cycle—from unvalidated software entering the environment, to secrets being leaked, to runtime drifting and breaking immutable behaviors.

    By outlining common security risks and practical use cases across every phase, this session helps security teams better understand how to efficiently manage security at the speed and scale of DevOps.

    In this webcast, you will also learn:

    - Security use cases at Build, Registry, and Runtime for containers
    - Importance of visibility into your container assets
    - Need for container-native vulnerability analysis
    - Strategies to detect and address drifting runtimes

    Ths webcast will also include a live demo and Q&A with the speaker.
  • Digital Certificate Management
    Digital Certificate Management Asif Karel, Director of Product Management Recorded: Jun 15 2018 31 mins
    Risk management in the age of DevOps and public clouds requires organizations to automate real-time visibility and tracking of their SSL certificate deployments. However, doing this is a challenge amidst the scale, speed and elasticity of assets and certificates in today's enterprise.

    Learn how Qualys CertView helps customers extend DevSecOps to prevent downtime and disruption, audit and compliance failures, and mitigate risks associated with expired or weak certificates and vulnerable TLS configurations.
  • Real-Time change monitoring for Compliance and Systems Monitoring
    Real-Time change monitoring for Compliance and Systems Monitoring Tim White, Director of Product Management, Qualys Recorded: Jun 15 2018 29 mins
    Real-time change detection has become a critical element of maintaining operational hygiene across rapidly changing assets typical of DevOps infrastructure.

    This talk will introduce how Qualys File Integrity Monitoring identifies and tracks change incidents across global IT environments. Learn how customers are using FIM to efficiently correlate events, quickly identify and filter out noise, and track review of incidents to meet compliance requirements."
  • Streamlining Compliance Programs for Operational Security
    Streamlining Compliance Programs for Operational Security Tim White, Director of Product Management, Qualys Recorded: Jun 14 2018 73 mins
    High profile breaches are contributing to an increasingly regulatory environment, both regionally and globally. This talk highlights the latest IT security and compliance challenges and discusses best practices to streamline compliance and risk programs using the Qualys Cloud Platform and its integrated Apps.

    Learn how to assess security configurations of IT systems, wherever they reside, log and track file changes across IT systems globally, help security teams implement the CIS 20 Critical Security Controls. automate collection and reporting of compliance data for both technical and non-technical controls and automate and standardize vendor risk assessment.

    Also, learn how companies in and outside of the EU can assess and maintain compliance with the EU's General Data Protection Regulation (GDPR).
  • Securing Web Apps for Production and DevOps Environments
    Securing Web Apps for Production and DevOps Environments Dave Ferguson, Director of Product Management, Qualys Recorded: Jun 14 2018 53 mins
    The need to test web applications and APIs for vulnerabilities in an automated fashion is greater than ever. Testing resources are scarce and new code is being written at breakneck speed while the business wants it deployed to production immediately.

    Learn about new tools and capabilities in Qualys Web Application Scanning (WAS) that are being introduced to help you integrate application security testing into this fast-paced, DevOps environment.
  • Securing Containers - From Build to Deployments
    Securing Containers - From Build to Deployments Hari Srinivasan, Director of Product Management, Qualys Recorded: Jun 14 2018 33 mins
    Containers are changing the IT landscape, empowering developers and operations with agility and scale that match the speed of business. Security teams must adapt to this transformation with new tailored methods to prevent threats and vulnerabilities in the Container environment.

    Learn how, with Qualys Container Security, you can gain total visibility and incorporate security into the DevOps cycle to harden and remove vulnerabilities before a container environment is operational.

    Understand how to secure the build environments using Jenkins vulnerability analysis plug-ins, and track runtime to identify containers not conforming to the immutable behavior.
  • Securing Cloud Environments and Workloads
    Securing Cloud Environments and Workloads Hari Srinivasan, Director of Product Management, Qualys Recorded: Jun 14 2018 46 mins
    Qualys provides comprehensive security coverage across workloads and resources in your public clouds. This session covers information on the available solution, deployment methodology and new features being released.

    Also, learn from three case studies from customers, including Capital One, on how you can automate securing DevOps for your public cloud workloads.

    Qualys introduces CloudView, a new app that helps security teams gain visibility of complete public cloud infrastructure and continuously monitor and secure it against misconfigurations, malicious behavior, and non-standard deployments.
  • IT Asset Discovery, Inventory, and Management
    IT Asset Discovery, Inventory, and Management Pablo Quiroga, Director of Product Management, Qualys Recorded: Jun 14 2018 31 mins
    This talk focuses on how to use Qualys Asset Inventory to enable instant, global visibility of IT assets across all environments – with comprehensive, up-to-date and normalized inventory.

    Attendees will learn how Asset Inventory provides a cohesive structure with automatic classification of technology, powered by our continuously curated product catalog. Qualys customers can now rationalize hardware and software to make strategic decisions across IT and Security.

    The scalable and centrally managed Qualys Sensors provide a wide range of asset data collection capabilities, including agentless, agent based and the latest addition, passive discovery.
  • Vulnerability Risk Management
    Vulnerability Risk Management Jimmy Graham, Director of Product Management, Qualys Recorded: Jun 14 2018 54 mins
    To address the challenges of vulnerability detections increasing year over year, Qualys is introducing new ways to visualize vulnerability data, layering Real-time Threat Information on top of detected vulnerabilities to provide consistent and automated remediation prioritization.

    Qualys is bringing AssetView technology to Qualys Vulnerability Management, allowing users to instantly search across vulnerabilities and create dynamic widgets and dashboards within the VM module.

    See the new VM Dashboard and instant search capabilities, a demo of Qualys Threat Protection, as well as a sneak peek at our new Reporting Module that will unify reports across the Qualys Cloud Platform.
  • Securing Hybrid IT Environments from Endpoints to Clouds
    Securing Hybrid IT Environments from Endpoints to Clouds Chris Carlson, VP of Product Management, Qualys Recorded: Jun 14 2018 53 mins
    As organizations accelerate their move to the cloud, securing their hybrid IT environments becomes dependent on building a unified approach to prevention and detection of breaches across global IT assets - whether on premises, endpoints, cloud, mobile or IoT.

    This talk will outline how enterprises are using the Qualys Cloud Agent to provide continuous Asset Management and Vulnerability Management for on-premises systems, user endpoints, and cloud instances. A new Indication of Compromise (IOC) app now also monitors, records, and analyzes millions of system events to deliver scalable threat intelligence verification, hunting and suspicious activity detection, and malware family detection for security analyst and incident response teams of all sizes.

    This expansion also extends the Qualys Cloud Platform capability to automate response with Patch Management. Learn how to deliver InfoSec, Endpoint, DevSec, and Cloud teams a single platform to secure an evolving global IT environment at a lower cost.

Embed in website or blog