Qualys, Inc. is a provider of cloud security, compliance and related services for small and medium-sized businesses and large corporations based in Redwood Shores, California. Founded in 1999, Qualys was the first company to deliver vulnerability management solutions as applications through the web using a "software as a service" (SaaS) model, and as of 2013 Gartner Group for the fifth time gave Qualys a "Strong Positive" rating for these services. It has added cloud-based compliance and web application security offerings.

Wikipedia
Qualys
Qualys
Blog Post
  • As cloud computing adoption accelerates among businesses, InfoSec teams are struggling to fully protect cloud workloads due to a lack of visibility into these environments, and to hackers’ increasingly effective attacks. That’s the main finding from SANS Institute’s “Cloud Security: Defense in Detail if Not in Depth” report, which surveyed IT and security pros from organizations of all sizes repre...

Qualys
Qualys
Blog Post
  • Tell your security story to your peers at RSA Conference 2018 San Francisco! Qualys is looking for customers excited to share their security and DevSecOps successes, best practices and case studies leveraging the use of the Qualys Cloud Platform. Take the stage in the Qualys booth to share your experience with RSA Conference attendees two […]

Qualys
Qualys
Blog Post
  • This December Patch Tuesday is considerably lighter than last month’s patch releases.  While only three of the fixes were for Windows operating systems, the majority of the vulnerabilities to pay attention to are Browser/Scripting Engine-based. Overall, this month’s updates address are fixes for 32 unique CVEs, 19 of which are critical, and 24 of which […]

Qualys
Qualys
Blog Post
  • Qualys wraps up its blog series on the Center for Internet Security’s Critical Security Controls (CSCs) by explaining how Qualys products can help in implementing controls 11 to 15. The CSCs are a set of 20 structured InfoSec best practices that offer a methodical and sensible plan for securing an organization's IT environment. The CSCs map to most security control frameworks, government regulatio...

Qualys
Qualys
Blog Post
  • Qualys continues its blog series on the Center for Internet Security’s Critical Security Controls (CSCs) by explaining how Qualys products can help in implementing controls 11 to 15. The CIS CSCs are a set of 20 structured InfoSec best practices that offer a methodical and sensible plan for securing an organization's IT environment. The CSCs map to most security control frameworks, government regu...

Qualys
Qualys
Blog Post
  • The Qualys library of built-in policies makes it easy to comply with the security standards and regulations that are most commonly used and adhered to. Qualys provides a wide range of policies, including many that have been certified by CIS as well as the ones based on security guidelines from vendors such as Microsoft and […]

Qualys
Qualys
Blog Post
  • This new patch release of the Qualys Cloud Platform, version 8.11.2, includes updates to shared platform features and Qualys Policy Compliance SCAP scanning. Feature Highlights Qualys Cloud Platform Users & Permissions – We’ve added optional extended permissions for the scanner role allowing users with that role to add IPs to Host Assets. Qualys Policy Compliance Relaunch […]

Qualys
Qualys
Blog Post
  • In the new 2017 edition of the OWASP Top 10, XML External Entities (XXE) make their first appearance at #A4 on the list. Qualys is pleased to announce that Qualys Web Application Scanning (WAS) engine 4.4 includes new detection capabilities for XXE vulnerabilities. About XML External Entities (XXE) If you’re unfamiliar with XXE, here is […]

Qualys
Qualys
Blog Post
  • Qualys continues its blog series on the Center for Internet Security’s Critical Security Controls (CSCs) by explaining how Qualys products can help in implementing controls 6 to 10. The CIS CSCs are a set of 20 structured InfoSec best practices that offer a methodical and sensible plan for securing an organization's IT environment. The CSCs map to most security control frameworks, government regul...

Qualys
Qualys
Blog Post
  • This November Patch Tuesday is moderate in volume, and in severity.  Microsoft released patches to address 53 unique vulnerabilities, with 25 focused on Remote Code Execution fixes. Windows OS receives 14 patches, while the lion’s share is focused on Browsers, Microsoft Office, and Adobe. According to Microsoft, there do not appear to be any actively […]

Qualys
Qualys
Blog Post
  • This blog post begins a series about how Qualys Cloud Platform — a single, integrated, end-to-end platform for prevention and response — can help security teams of any size to broadly and comprehensively adopt the Center for Internet Ssecurity's Critical Security Controls. This structured and prioritized set of 20 foundational InfoSec best practices offers a methodical and sensible approach for se...

Qualys
Qualys
Blog Post
  • Dark Reading is reporting on a new banking trojan called ‘Silence’ that mimics techniques similar to the Carbanak hacker group targeting banks and financial institutions.  The attack vector is similar – target individuals using spear-phish emails to trick them into running a malicious attachment which will connect to download a dropper to further infect the […]

Qualys
Qualys
Landing Page

qualys

 
Qualys
Qualys
Blog Post
  • The IT industry has gone through multiple revolutions – client-server computing, the Internet’s rise, virtualization, mobility – but none rivals the unprecedented impact of today’s digital transformation. The implications for InfoSec professionals are broad, requiring that they adapt quickly to the profound changes brought about by digital transformation trends, Scott Crawford, a 451 Research anal...

Qualys
Qualys
Blog Post
  • Qualys Product Management Director Tim White and SANS Institute Analyst John Pescatore did a deep dive into the Center for Internet Security’s Critical Security Controls during a recent webcast, and answered questions from audience members about these 20 foundational security practices, and about the importance of maintaining basic security hygiene. In this blog post, we’re providing edited transc...

Qualys
Qualys
Blog Post
  • A new ransomware campaign has affected at least three Russian media companies in a fast-spreading malware attack. Fontanka and Interfax are among the companies affected by the Bad Rabbit ransomware named by the researchers who first discovered it. The malware is delivered as fake Flash installer, it uses the SMB protocol to check hardcoded credentials. Bad Rabbit does not […]

Qualys
Qualys
Blog Post
  • U.S. law has failed to protect Americans from widespread and excessive surveillance, a dire situation that requires immediate attention from citizens, lawmakers, attorneys, privacy experts and the courts, says Jennifer S. Granick of the American Civil Liberties Union at Qualys Security Conference 2017 closing keynote.

Qualys
Qualys
Blog Post
  • Digital transformation initiatives, if properly implemented, must go way beyond deploying the latest shiny IT systems. Instead, they must aim to fundamentally disrupt and reinvent business processes throughout the entire organization. That was the message Qualys Chief Product Officer Sumedh Thakar delivered on Wednesday during his morning keynote “Our Journey into the Cloud: The Qualys […]

Qualys
Qualys
Blog Post
  • It’s key for InfoSec teams to unobtrusively embed their automated security tools within the development environment via APIs, so that security scans, testing and monitoring happen transparently, without disrupting the flow of the DevOps pipeline. If that’s achieved, the organization will have successfully turned their DevOps teams into DevSecOps teams.

Qualys
Qualys
Blog Post
  • Qualys Cloud Suite, version 8.11, adds several new major features: Customizable Login Banners, QID Changelog View, PCAP Scanning in Express Lite subscriptions, improvements to File Monitoring UDC, and expanded Policy Compliance platform support including Palo Alto Firewall, MongoDB, and Apache Tomcat on Windows.

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.