Qualys, Inc. is a provider of cloud security, compliance and related services for small and medium-sized businesses and large corporations based in Redwood Shores, California. Founded in 1999, Qualys was the first company to deliver vulnerability management solutions as applications through the web using a "software as a service" (SaaS) model, and as of 2013 Gartner Group for the fifth time gave Qualys a "Strong Positive" rating for these services. It has added cloud-based compliance and web application security offerings.

Wikipedia
Qualys
Qualys
Blog Post
  • Digital transformation initiatives, if properly implemented, must go way beyond deploying the latest shiny IT systems. Instead, they must aim to fundamentally disrupt and reinvent business processes throughout the entire organization. That was the message Qualys Chief Product Officer Sumedh Thakar delivered on Wednesday during his morning keynote “Our Journey into the Cloud: The Qualys […]

Qualys
Qualys
Blog Post
  • It’s key for InfoSec teams to unobtrusively embed their automated security tools within the development environment via APIs, so that security scans, testing and monitoring happen transparently, without disrupting the flow of the DevOps pipeline. If that’s achieved, the organization will have successfully turned their DevOps teams into DevSecOps teams.

Qualys
Qualys
Blog Post
  • Qualys Cloud Suite, version 8.11, adds several new major features: Customizable Login Banners, QID Changelog View, PCAP Scanning in Express Lite subscriptions, improvements to File Monitoring UDC, and expanded Policy Compliance platform support including Palo Alto Firewall, MongoDB, and Apache Tomcat on Windows.

Qualys
Qualys
Blog Post
  • Qualys’ library of built-in policies makes it easy to comply with the security standards and regulations that are most commonly used and adhered to. Qualys provides a wide range of policies, including many that have been certified by CIS as well as the ones based on security guidelines from vendors such as Microsoft and VMware. […]

Qualys
Qualys
YouTube Video
  • Security teams must adapt security controls to the growing use of DevOps processes such as cloud services, Continuous Integration and Continuous Deployment. Many of them are adopting an approach of Security delivered as a service, or DevSecOps. In this webcast, SANS Senior Analyst John Pescatore joins Chris Carlson, VP Product Management for Qualys Cloud Agent Platform, discuss how DevSecOps help...

Qualys
Qualys
Blog Post
  • During a recent webcast, Qualys Product Management Director Tim White and SANS Institute Analyst John Pescatore discussed how applying basic cyber security hygiene principles goes a long way towards preventing security incidents. White and Pescatore talked about how the Center for Internet Security's Critical Security Controls can help organizations attain a solid cyber security foundation.

Qualys
Qualys
SlideShare Presentation
  • Security teams must adapt security controls to the growing use of DevOps processes such as cloud services, Continuous Integration and Continuous Deployment. Many of them are adopting an approach of Security delivered as a service, or DevSecOps. In this webcast, SANS Senior Analyst John Pescatore joins Chris Carlson, VP Product Management for Qualys Cloud Agent Platform, discuss how DevSecOps hel...

Qualys
Qualys
SlideShare Presentation
  • Trends like the increased use of cloud computing by businesses and their vendors introduce new complexities in reducing risk and assessing security across the supply chain. Demonstrating continuous risk reduction and compliance with internal policies and external regulations, fixing violations and configuration drift, centrally managing exceptions, and documenting progress are all common challeng...

Qualys
Qualys
SlideShare Presentation
  • As quickly as we learn to detect new threats, the threats change — like a game of Whack-a-Mole happening at an ever-increasing pace. A new survey by the SANS Institute focuses on providing valuable intelligence into the types of threats most severely impacting organizations like yours, and how those threats are evolving. In this webcast, Lee Neely, who teaches cyber security courses for SANS, M...

Qualys
Qualys
YouTube Video
  • Trends like the increased use of cloud computing by businesses and their vendors introduce new complexities in reducing risk and assessing security across the supply chain. Demonstrating continuous risk reduction and compliance with internal policies and external regulations, fixing violations and configuration drift, centrally managing exceptions, and documenting progress are all common challenge...

Qualys
Qualys
Blog Post
  • Today Microsoft released patches covering 62 vulnerabilities as part of August’s Patch Tuesday update, with 30 of them affecting Windows. Patches covering 28 of these vulnerabilities are labeled as Critical, and 33 can result in Remote Code Execution.

Qualys
Qualys
Blog Post
  • Earlier this month, after roughly six months of deliberation and planning, Google finalised their plans for staged deprecation of Symantec certificates. The process began in March 2017 when Google had announced on the Blink mailing list that they had lost confidence about Symantec’s certificate issuance policies and practices of recent years. The initial deprecation proposal […]

Qualys
Qualys
YouTube Video
  • As quickly as we learn to detect new threats, the threats change — like a game of Whack-a-Mole happening at an ever-increasing pace. A new survey by the SANS Institute focuses on providing valuable intelligence into the types of threats most severely impacting organizations like yours, and how those threats are evolving. In this webcast, Lee Neely, who teaches cyber security courses for SANS, Ma...

Qualys
Qualys
YouTube Video
  • Stay secure, save time and money, and feel confident audit after audit. Get a free trial of Qualys Policy Compliance https://www.qualys.com/free-trial/#/pc Contact Qualys for more information: 800.745.4355 https://www.qualys.com/company/contacts The Qualys cloud-based compliance monitoring solution continuously captures the security and compliance posture of your entire environment. You no l...

Qualys
Qualys
Blog Post
  • This is the third post in my series on HPKP. In my first post I declared HPKP dead, and in my second post I explored the possibility of fixing it by introducing pin revocation. Today I will consider an entirely different approach to make HPKP much safer, by changing how it’s activated. In my previous […]

Qualys
Qualys
Blog Post
  • Today Microsoft released a fairly large batch of patches covering 81 vulnerabilities as part of September’s Patch Tuesday update, with 38 of them impacting Windows. Patches covering 27 of these vulnerabilities are labeled as Critical, and 39 can result in Remote Code Execution (RCE).  According to Microsoft, one vulnerability impacting HoloLens has a public exploit. […]

Qualys
Qualys
Landing Page

Qualys

 
Qualys
Qualys
Blog Post
  • Last year, almost exactly to the day, I declared HPKP effectively dead. I believed then—and I still do—that HPKP is too complex and too dangerous to be worth the effort. The biggest problem lies in the fact that there is no sufficient margin of safety; pinning failures are always catastrophic. That’s always bothered me and […]

Qualys
Qualys
Blog Post
  • A new SANS Institute report found that end users and their devices are at the center of the battle between enterprise InfoSec teams and malicious hackers. Why? When compromised, end users and endpoints offer intruders major entry points into corporate networks, but they're also their organizations’ best threat detection tools.

Qualys
Qualys
Blog Post
  • This release of the Qualys Cloud Platform version 2.30 includes updates and new features for Cloud Agent, EC2 Connector, Web Application Scanning, Web Application Firewall, and Security Assessment Questionnaire, highlights as follows: Cloud Agent Cloud Agent Download Results – search results in the Cloud Agent user interface can be downloaded to a file similar to AssetView […]

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.