Proactively Monitor Both Perimeter and Internal IT Assets

Logo
Presented by

Wolfgang Kandek, CTO, Qualys

About this talk

Webcast highlights include learning how to: - Continuously monitor and respond to changes—in your internal environment such as new hosts, OS changes, open ports and services, SSL certificates, as well as changes in vulnerabilities and software - Scan vulnerable machines—which can be exploited within hours and can lead to compromises in your IT environments such as zero-days and phishing scams
Related topics:

More from this channel

Upcoming talks (7)
On-demand talks (130)
Subscribers (74156)
Join us for this informative technology series for insights into emerging security trends that every IT professional should know. These brief sessions will give you an opportunity to discover best practices from market leaders as well as hands-on advice from industry experts on a variety of security and compliance topics. Let Qualys help keep you up-to-date with cost-effective and efficient technology trends. Choose the topic that interests you or plan to attend the entire series to make sure you stay ahead of the curve.