Qualys, Inc. is a provider of cloud security, compliance and related services for small and medium-sized businesses and large corporations based in Redwood Shores, California. Founded in 1999, Qualys was the first company to deliver vulnerability management solutions as applications through the web using a "software as a service" (SaaS) model, and as of 2013 Gartner Group for the fifth time gave Qualys a "Strong Positive" rating for these services. It has added cloud-based compliance and web application security offerings.

Wikipedia
Qualys
Qualys
YouTube Video

New YouTube videos detected.

  • Achieving Visibility into Post Breach Detection with Qualys CA
    Qualys video at Black Hat 2017 This session details the expansion of the Qualys Cloud Platform to include Indicator of Compromise (IOC) detection, one of two new products that deliver visibility into post-breach detection, as well using the Qualys Platform to remediate and harden systems, and avoid breaches. Malware infections are unavoidable – learn how Qualys Indicator of Compromise detection c...
Qualys
Qualys
YouTube Video

New YouTube videos detected.

  • Achieving Visibility into Post Breach Detection with Qualys CA
    Qualys video at Black Hat 2017 This session details the expansion of the Qualys Cloud Platform to include Indicator of Compromise (IOC) detection, one of two new products that deliver visibility into post-breach detection, as well using the Qualys Platform to remediate and harden systems, and avoid breaches. Malware infections are unavoidable – learn how Qualys Indicator of Compromise detection c...
Qualys
Qualys
YouTube Video

New YouTube videos detected.

  • Spot & Patch Web App Vulns in One Click
    Application security is a complicated and expensive undertaking. The sheer volume of applications, vulnerabilities, and disparate teams involved in development all add up to make it a daunting challenge. To ensure that vulnerabilities are addressed before the production phase — when they are the most costly to fix — you need to incorporate web app security into every step of your secure developmen...
Qualys
Qualys
YouTube Video

New YouTube videos detected.

  • Spot & Patch Web App Vulns in One Click
    Application security is a complicated and expensive undertaking. The sheer volume of applications, vulnerabilities, and disparate teams involved in development all add up to make it a daunting challenge. To ensure that vulnerabilities are addressed before the production phase — when they are the most costly to fix — you need to incorporate web app security into every step of your secure developmen...
Qualys
Qualys
YouTube Video

New YouTube videos detected.

  • Qualys Security Assessment Questionnaire
    Excel at Your Security Assessments Without EXCEL Spreadsheets. Streamline your vendor and IT risk audits with a centralized solution. Get a free trial: qualys.com/forms/trials/security-assessment-questionnaire/ Contact Qualys: 800.745.4355 qualys.com/company/contacts
Qualys
Qualys
YouTube Video

New YouTube videos detected.

  • Qualys Asset Inventory - Complete Visibility of Global IT Assets
    Do you know what’s connected to your network? You can secure the IT assets you can see, but in today’s perimeterless world, unknown devices and software could be putting your organization at risk. You can’t secure what you don’t know is there. With self-managing Qualys AssetView, you can achieve full visibility into your global IT assets. Start detecting today with a free trial! https://qualys.co...
Qualys
Qualys
Blog Post

New blog articles detected.

  • Call for Papers: Qualys Security Conference 2017
    Our annual user conference, QSC17, is quickly approaching and we are looking for presentations on hot topics related to security, best practices and case studies leveraging the use of Qualys technologies. If you would like to be considered as a presenter, please send a session title and short abstract to David Conner at dconner@qualys.com. The […]
Qualys
Qualys
Blog Post

New blog articles detected.

  • Qualys Policy Compliance Notification: Policy Library Update
    Qualys’ library of built-in policies makes it easy to comply with commonly adhered to security standards and regulations. Qualys provides a wide range of policies, including many that have been certified by CIS as well as ones based on security guidelines from vendors such as Microsoft and VMware. In order to keep up with the […]
Qualys
Qualys
Blog Post

New blog articles detected.

  • Countdown to GDPR: IT Policy Compliance
    The Qualys blog series on GDPR preparedness continues with this installment focused on another core component for meeting the regulation's requirements: policy compliance.
Qualys
Qualys
Blog Post

New blog articles detected.

  • Qualys Cloud Suite 8.10.2 New Features
    This new patch release of the Qualys Cloud Suite, version 8.10.2, includes updates to shared platform features, a new role for user management, and expanded Policy Compliance platform support. Feature Highlights Qualys Cloud Platform Limit number of external scanners – You can now limit the number of external scanners used in external scans within the […]
Qualys
Qualys
YouTube Video

New YouTube videos detected.

  • Vulnerability Management and Compliance for Elastic Public Cloud Instances
    Qualys video at Black Hat 2017 Qualys solutions provide security and compliance for your cloud workloads across AWS, Azure and Google clouds. Come gain insights into how Qualys customers gain total visibility of their cloud server instances, identify vulnerabilities, and check compliance to help them keep up with shared security responsibility models.
Qualys
Qualys
Blog Post

New blog articles detected.

  • August Patch Tuesday: 25 critical Microsoft vulnerabilities, 43 for Adobe
    Today Microsoft released patches covering 48 vulnerabilities as part of August’s Patch Tuesday update, with 15 of them affecting Windows. Patches covering 25 of these vulnerabilities are labeled as Critical, and 27 can result in Remote Code Execution. According to Microsoft, none of these vulnerabilities are currently being exploited in the wild. Top priority for […]
Qualys
Qualys
YouTube Video

New YouTube videos detected.

  • Cisco - Using Qualys WAS for a Secure Software Development Lifecycle
    Qualys customer case study video at Black Hat 2017 As part of a mature and secure web application development lifecycle, continuous security scans are imperative to support the requirements of NIST SP 800-53v4 to support web application development for government customers. This continuous process must consist of automated scans coupled with manual testing. The focus of this presentation is to ex...
Qualys
Qualys
YouTube Video

New YouTube videos detected.

  • Using Qualys FIM to Track File Changes Across Global IT Assets
    Qualys video at Black Hat 2017 This talk will introduce how to use the new Qualys File Integrity Monitoring to identify and track change across internal IT environments. Learn how these innovations can help customers with change monitoring and compliance efforts, and can reduce the time needed to pinpoint where policy violations may have taken place, so teams can more quickly remediate them.
Qualys
Qualys
YouTube Video

New YouTube videos detected.

  • Fiserv - Leveraging Qualys Vulnerability Management and Threat Protection
    Qualys customer case study video at Black Hat 2017 Are you struggling to get your company's threat and vulnerability data in front of the right teams for active response and remediation? Come and hear how Fiserv is using Qualys' Vulnerability Management with Threat Protection to provide meaningful and manageable dashboards and reports for Business Units of all sizes across the Fiserv enterprise.
Qualys
Qualys
YouTube Video

New YouTube videos detected.

  • Expand Current Vulnerability Management Programs by Eliminating Security Misconfigurations
    Qualys video at Black Hat 2017 Learn how to build configuration assessment into your overall Security and Vulnerability Management Program. This presentation will showcase how Qualys Security Configuration Assessment (SCA) helps expand your current Vulnerability management program by automating the configuration assessment and reporting of varied IT assets in a continuous manner. We'll showcase o...
Qualys
Qualys
YouTube Video

New YouTube videos detected.

  • Container Security in the World of DevSecOps
    Qualys video at Black Hat 2017 Containers are probably the most talked-about infrastructure technology of the past few years. With their rapid growth, containers are transforming the DevOps process with increased agility and delivery speed. Security teams need to be at the forefront of this change, and security processes need to shift left and into the developer's build cycle.
Qualys
Qualys
YouTube Video

New YouTube videos detected.

  • Achieving Visibility into Post Breach Detection with Qualys IOC
    Qualys video at Black Hat 2017 This session details the expansion of the Qualys Cloud Platform to include Indicator of Compromise (IOC) detection, one of two new products that deliver visibility into post-breach detection, as well using the Qualys Platform to remediate and harden systems, and avoid breaches. Malware infections are unavoidable – learn how Qualys Indicator of Compromise detection c...
Qualys
Qualys
YouTube Video

New YouTube videos detected.

  • Genesys - Building Security Tool Synergy
    Qualys customer case study video at Black Hat 2017 Learn why and how organizations are applying the concept of "synergy" — combining or integrating several organizational groups for greater value-add — to their security tools as a strategy to build greater value for both infosec and the broader business. This talk highlights how Genesys used the Qualys Cloud Platform to combine and integrate Vuln...
Qualys
Qualys
YouTube Video
Qualys
Qualys
YouTube Video

New YouTube videos detected.

Qualys
Qualys
YouTube Video

New YouTube videos detected.

  • Achieving Visibility into Post Breach Detection with Qualys IOC
    Qualys video at Black Hat 2017 This session details the expansion of the Qualys Cloud Platform to include Indicator of Compromise (IOC) detection, one of two new products that deliver visibility into post-breach detection, as well using the Qualys Platform to remediate and harden systems, and avoid breaches. Malware infections are unavoidable – learn how Qualys Indicator of Compromise detection c...
Qualys
Qualys
YouTube Video

New YouTube videos detected.

  • Bugcrowd - Integrating Qualys WAS and the Creativity of the Crowd
    Qualys customer case study video at Black Hat 2017 Qualys recently announced a groundbreaking integration with Bugcrowd, allowing customers to share data between the two platforms and harness the creativity of the worldwide research community. We'll demonstrate the integration and discuss how customers are using it to improve their security programs.
Qualys
Qualys
Blog Post

New blog articles detected.

  • CyberSecurity Report: Threat Landscape Gets More Sophisticated
    Destruction of service. Get acquainted with this newly-minted term, and with its acronym — DeOS. It’s a particularly disturbing type of cyber attack InfoSec teams may face regularly in the not too distant future. That’s one of the main findings featured in the Cisco 2017 Midyear Cybersecurity Report, a comprehensive cyber security study the networking […]
Qualys
Qualys
Blog Post

New blog articles detected.

  • Countdown to GDPR: Manage Vulnerabilities
    In this blog post, Qualys continues its series on preparing for the European Union's General Data Protection Regulation (GDPR) by diving into the topic of vulnerability management and its importance for staying compliant with this regulation, which goes into effect in May 2018.
Qualys
Qualys
SlideShare Presentation

New SlideShare presentations detected.

  • Qualys Corporate Brochure
    Everything visible. Everything secure. Unparalleled visibility, end-to-end security and compliance for all your global IT assets

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.