SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Downloaden Sie, um offline zu lesen
QualysGuard Suite 7.0
Updates and New features

                  Marek Skalicky, CISM, CRISC
 Regional Account Manager for Central & Adriatic Eastern Europe
QualysGuard® SaaS Applications

        Enterprise                           SMB                 Freemium Services

                       QualysGuard On Demand Portal
     Analyze                Comply                  Monitor              Prevent

 Vulnerability Mgmt.     Policy Compliance     Web Application Logs   Web App. Firewall*
   Web App Scan           PCI Compliance        Botnet Detection*
 Malware Detection          Qualys Seal
     SSL Labs              SCAP / FDCC
 Zero days analyzer      Compliance Mgmt*


              QualysGuard SaaS Technology Platform
          Scanners & Collectors                Open APIs, Web Services & Integrations
QualysGuard Architecture Updates
 Security Operations Center (SOC)                     Private Clouds (PC)        Future SOC and PC




                                                            EU SOC
                            PC
                                                                     PC
                       PC                               EU SOC
    US SOC
                  PC                                                                          PC
     PC                          US SOC          PC
             PC                                                                             PC
                                                                            PC




                                                                                    SOC




                                    PC
                                                                                                   PC


                                          New Backup SOCs in US and EU
QualysGuard Global
Infrastructure
Virtual vScanner and Virtual Private SOC




                                                                                    QualysGuard SW
                                                                                    Virtual Scanner


                                                               QualysGuard SW
                                                              Virtual Private SOC




          World’s Largest global Vulnerability Management deployment at Daimler
           - 293 scanner appliances scanning over a million IPs in 80 locations
          Performing 600+ Million IP scan and maps per year
                                       4
Private Cloud - @Customer HW SOC
Qualys Supplied Hardware installed at customers premises

                   Front Office UI         Back Office UI            QualysGuard API
                                                                                                     Virtualized Web
                    Distribution                Reporting               JobD Bus          • vmware   and Application
                                                                                                     Layer

                                   Monitoring                Logging



                                                                       • DB Audit Vault
                                                                       • Virtual Private DB          Database Layer
                  Reports               Core                Portal


                  Platform                          • Redundant and Secure Network Core
                  • High Availability               • Redundant Service Infrastructure               Infrastructure
                  • Secure Network                  • Redundant Database Infrastructure              Layer
Private Cloud – Virtual SOC (Q2 2012)

    Customer Supplied Hardware Virtualization platform

     Front Office UI         Back Office UI         QualysGuard API

                                                                          • vmware   Virtualized Web and
      Distribution                Reporting             JobD Bus
                                                                                     Application Layer

                     Monitoring               Logging




                                                              • DB Audit Vault       Virtualized
                                                              • Virtual Private DB   Database Layer
        Reports               Core                 Portal



                                                                                     Infrastructure
                                                                                     Layer
                                  Customer Infrastructure
New QualysGuard Virtual Scanner
Running on Virtualized platforms including laptops

Supported Virtual Platforms:
•   Oracle Virtual Box (Open Source)
•   VMware ESXi, ESX, Workstation, Player,
    Fusion, vCenter, vSphere
•   Microsoft Hyper-V (Coming soon)
•   Citrix XenServer 6.0 (Coming soon)

RESOURCES - MINIMUM
•   1 x vCPU core
•   1 GB RAM
•   1 x 40GB virtual HDD

RESOURCES - RECOMMENDED
•   2 x vCPU cores
•   4 GB RAM
•   1 x 40GB virtual HDD




                                             CONFIDENTIAL | 7
Password Vaults Integration
Password Vaults Integration
  For GQ authenticated scanning
  Local encrypted credentials storage

Very easy to implement
  1 day project including C-A
   implementation
  References: Rabobank, Discover, CNB

Password Vaults Technologies
  Cyber-Ark PIM Suite
  Thycotic Secret Server
  … others coming soon
VeriSign VIP Two-factor Authentication

1) Download free SW Token                          2) Edit user settings in QG
https://vipmobile.verisign.com/supportedphones.v




3) Login with VeriSign VIP
QualysGuard Web 2.0 UI
Dynamic and Role Based UI

    Common User Experience Across all Applications
      − Interactive Dashboards             − Context-based UI
      − Powerful Workflows            − Actionable Menus & Filters




                                 10
QualysGuard Suite of Security
& Compliance Applications




                11
QualysGuard Suite of SaaS Services

                              AUTOMATE
 - Asset Management (ICT Asset Discovery, Tagging and Prioritization)
 - Risk Management (ICT Vulnerability Analyses, Remediation, Verification)
 - Compliance Management (ICT Configuration Standards and Audits)




        … by SaaS Service on your request, demand, price and scope!


                                   CONFIDENTIAL | 12
Qualys Asset Management
(patent pending)


Powerful ability to manage,
search and tag assets
− Organizing ICT Assets using Tags
- Static and Dynamic asset tagging
- Hierarchical asset tagging
− Uses existing VM scan data
− Integrated with existing QG apps.

Asset Tagging/Searching/Reporting
based on
- platforms, applications, services
- IT responsibility
- Based on locality
- Based on Business Processes




                                      CONFIDENTIAL | 13
Qualys Asset Management
Host tagging & Web application tagging




                            CONFIDENTIAL | 14
Qualys Asset Management
Reports by tags & User permissions by tags




                             CONFIDENTIAL | 15
QualysGuard Suite of SaaS Services

                              AUTOMATE
 - Asset Management (ICT Asset Discovery, Tagging and Prioritization)
 - Risk Management (ICT Vulnerability Analyses, Remediation, Verification)
 - Compliance Management (ICT Configuration Standards and Audits)




        … by SaaS Service on your request, demand, price and scope!


                                   CONFIDENTIAL | 16
Qualys Vulnerability Management

New UI and Asset Tagging

Market leader since 2008
    Gartner, IDC, Forrester, Frost & Sullivan
    SC Magazine best Vulnerability Mgt
    solution 6 years in a row


Full VM Cycle
•   Free and unlimited network discovery
•   Discover, group, & prioritize network assets
•   Identify vulnerabilities, exploits, malware,
    patches, & unsupported technologies
•   Prioritize, execute & audit remediation
•   Automate reporting, trending, & alerting


13,000+ signatures covering 55K+
  vulnerabilities, updated daily
Zero-Day Analyzer for VM
GA – April in Europe

Zero-Day Analyzer for VM
  Allows customers to analyze zero-day threats
  and estimate their impact on their assets and
  critical systems based on information
  collected from previous scan results.


Benefits
  Latest signatures for iDefense exclusive zero-
  day threats

  Customizable alerting and email notifications

 Actionable data with estimates about what
  systems are at risk

                                                        http://www.qualys.com/zero-day
                                                   18
QualysGuard Suite of SaaS Services

                              AUTOMATE
 - Asset Management (ICT Asset Discovery, Tagging and Prioritization)
 - Risk Management (ICT Vulnerability Analyses, Remediation, Verification)
 - Compliance Management (ICT Configuration Standards and Audits)




        … by SaaS Service on your request, demand, price and scope!


                                   CONFIDENTIAL | 19
Qualys Policy Compliance Management


New UI and Asset Tagging

New Consultant customs Reports

Golden Image Policy

2300+ controls over 50 platforms

User controls for Win/Unix
Customizable Questionnaires for PC
Beta available
Custom Questionnaires
  Enables customers to easily build
  questionnaires using the Unified Compliance
  Framework (UCF), as well as leverage
  existing business process workflows to
  evaluate controls, gather documents and
  evidence and validate compliance.


Benefits
  Automation of manual assessments

  Ability to define/customize audit work flow

  Industry leading policy repository of nearly
  1000 standards and regulations via UCF
                                                 http://www.qualys.com/forms/questionnaires/

                                                  21
Free Premium Services and Qualys
 Open-Source research activities

 “QualysGuard Freemium Suite”




             CONFIDENTIAL | 22
New Qualys FreeScan for Web Sites

5 External Scans for your
Perimeter and Web site:
•   IP Vulnerability Scan
•   Web Application Vulnerability
•   Web Application Malware scan
•   Full Reporting functionality




                  Register here: http://www.qualys.com/forms/freescan/
Free BrowserCheck Business Edition

Audit state of browsers
security in the enterprise
•   Simple & Scalable
•   Multiple platform & browsers
•   Multiple Browser Plugins
•   Centralized Reporting
•   No SW/HW to install!




        Register here: http://www.qualys.com/forms/browsercheck-
        business-edition/
Free SSL Lab Audit Service

Audit implementation of
SSL protocol on you Web
•   Certificate Validity and Trust
•   SSL Protocol version support
•   Encryption Cipher Strength
•   Encryption Key Exchange
•   SOLUTION description
•   Risk of Attack description




                               Register here: http://www.ssllabs.com
Qualys Global Community
Join us at https://community.qualys.com




                                                                            Total Members
                               4500
                               4000
                               3500
                               3000
                               2500
                               2000
                               1500
                               1000
                               500
                                 0
                                      24.7
                                             24.8
                                                    24.9




                                                                                   24.1
                                                                                          24.2
                                                                                                 24.3
                                                                                                        24.4
                                                                                                               24.5
                                                                                                                      24.6
                                                                                                                             24.7
                                                                                                                                    24.8
                                                                                                                                           24.9
                                                           24.10
                                                                   24.11
                                                                           24.12




                                                                                                                                                  24.10
                                                                                                                                                          24.11
                                                                                                                                                                  24.12
                          26
CSO Interchange Events
Coming to a City Near You




            http://www.csointerchange.org
                           27
Qualys Security Conferences ‘12
Las Vegas, Munich, London and Paris




            http://www.qualys.com/qsc
                          28
Thank You
 mskalicky@qualys.com

Weitere ähnliche Inhalte

Was ist angesagt?

(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...Priyanka Aash
 
F5 Programmability & Orchestration
F5 Programmability & OrchestrationF5 Programmability & Orchestration
F5 Programmability & OrchestrationMarketingArrowECS_CZ
 
ZyLAB Security and Compliance
ZyLAB Security and ComplianceZyLAB Security and Compliance
ZyLAB Security and ComplianceZyLAB
 
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)Jason Mashak
 
VMworld 2016 Recap
VMworld 2016 RecapVMworld 2016 Recap
VMworld 2016 RecapKevin Groat
 
Runecast Analyzer Overview
Runecast Analyzer OverviewRunecast Analyzer Overview
Runecast Analyzer OverviewStanimir Markov
 
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Iftikhar Ali Iqbal
 
QualysGuard InfoDay 2013 - QualysGuard RoadMap for H2-­2013/H1-­2014
QualysGuard InfoDay 2013 - QualysGuard RoadMap for H2-­2013/H1-­2014QualysGuard InfoDay 2013 - QualysGuard RoadMap for H2-­2013/H1-­2014
QualysGuard InfoDay 2013 - QualysGuard RoadMap for H2-­2013/H1-­2014Risk Analysis Consultants, s.r.o.
 
Cloud security introduction
Cloud security introductionCloud security introduction
Cloud security introductionCalvin Lee
 
SAXOTECH Managed Hosting
SAXOTECH Managed HostingSAXOTECH Managed Hosting
SAXOTECH Managed Hostingwebhostingguy
 
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)Jason Mashak
 
040711 webcast securing vmachine
040711 webcast securing vmachine 040711 webcast securing vmachine
040711 webcast securing vmachine Erin Banks
 
Achieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By DesignAchieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By DesignAmazon Web Services
 
Case Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private CloudCase Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private CloudVMware
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecRobb Boyd
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...EnergySec
 
Cisco Study: State of Web Security
Cisco Study: State of Web Security Cisco Study: State of Web Security
Cisco Study: State of Web Security Cisco Canada
 
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraCheck Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraMarketingArrowECS_CZ
 
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ...
[Cisco Connect 2018 - Vietnam] Rajinder singh   cisco sd-wan-next generation ...[Cisco Connect 2018 - Vietnam] Rajinder singh   cisco sd-wan-next generation ...
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ...Nur Shiqim Chok
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Anwesh Dixit
 

Was ist angesagt? (20)

(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
 
F5 Programmability & Orchestration
F5 Programmability & OrchestrationF5 Programmability & Orchestration
F5 Programmability & Orchestration
 
ZyLAB Security and Compliance
ZyLAB Security and ComplianceZyLAB Security and Compliance
ZyLAB Security and Compliance
 
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)Runecast: Simplified Security with Unparalleled Transparency (March 2022)
Runecast: Simplified Security with Unparalleled Transparency (March 2022)
 
VMworld 2016 Recap
VMworld 2016 RecapVMworld 2016 Recap
VMworld 2016 Recap
 
Runecast Analyzer Overview
Runecast Analyzer OverviewRunecast Analyzer Overview
Runecast Analyzer Overview
 
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)
 
QualysGuard InfoDay 2013 - QualysGuard RoadMap for H2-­2013/H1-­2014
QualysGuard InfoDay 2013 - QualysGuard RoadMap for H2-­2013/H1-­2014QualysGuard InfoDay 2013 - QualysGuard RoadMap for H2-­2013/H1-­2014
QualysGuard InfoDay 2013 - QualysGuard RoadMap for H2-­2013/H1-­2014
 
Cloud security introduction
Cloud security introductionCloud security introduction
Cloud security introduction
 
SAXOTECH Managed Hosting
SAXOTECH Managed HostingSAXOTECH Managed Hosting
SAXOTECH Managed Hosting
 
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)
 
040711 webcast securing vmachine
040711 webcast securing vmachine 040711 webcast securing vmachine
040711 webcast securing vmachine
 
Achieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By DesignAchieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By Design
 
Case Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private CloudCase Study: EVO SDDC Powered Private Cloud
Case Study: EVO SDDC Powered Private Cloud
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSec
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
 
Cisco Study: State of Web Security
Cisco Study: State of Web Security Cisco Study: State of Web Security
Cisco Study: State of Web Security
 
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraCheck Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
 
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ...
[Cisco Connect 2018 - Vietnam] Rajinder singh   cisco sd-wan-next generation ...[Cisco Connect 2018 - Vietnam] Rajinder singh   cisco sd-wan-next generation ...
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ...
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 

Andere mochten auch

4 Best Practices for Patch Management in Education IT
4 Best Practices for Patch Management in Education IT4 Best Practices for Patch Management in Education IT
4 Best Practices for Patch Management in Education ITKaseya
 
Manos a la obra: Cómo dar grandes pasos en el marketing digital
Manos a la obra: Cómo dar grandes pasos en el marketing digitalManos a la obra: Cómo dar grandes pasos en el marketing digital
Manos a la obra: Cómo dar grandes pasos en el marketing digitalIgni
 
Los retablos en sevilla 1
Los retablos en sevilla 1Los retablos en sevilla 1
Los retablos en sevilla 1Sanmoreno
 
Mobile messaging solutions for online gaming companies
Mobile messaging solutions for online gaming companiesMobile messaging solutions for online gaming companies
Mobile messaging solutions for online gaming companiesMDK Labs GmbH
 
Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...
Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...
Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...Grup Pere Mata
 
Educación Vial
Educación VialEducación Vial
Educación VialBitaka
 
Twig Embody - the wearable 3G/GSM/GNSS personal alarm device
Twig Embody - the wearable 3G/GSM/GNSS personal alarm deviceTwig Embody - the wearable 3G/GSM/GNSS personal alarm device
Twig Embody - the wearable 3G/GSM/GNSS personal alarm deviceJane Lindell
 
Howard C. Williams good resume
Howard C. Williams good resumeHoward C. Williams good resume
Howard C. Williams good resumeHoward Williams
 
Sanjay_Saini-Resume
Sanjay_Saini-ResumeSanjay_Saini-Resume
Sanjay_Saini-ResumeSanjay Saini
 
Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for CloudMphasis
 
Biblioteca Escolar Valenzuela
Biblioteca Escolar ValenzuelaBiblioteca Escolar Valenzuela
Biblioteca Escolar Valenzuelaamalba
 
Efectos de las aflatoxinas
Efectos de las aflatoxinasEfectos de las aflatoxinas
Efectos de las aflatoxinasESPOL
 
Anatomía cardiovascular por imagen
Anatomía cardiovascular por  imagenAnatomía cardiovascular por  imagen
Anatomía cardiovascular por imagenITESM - EMIS
 
Primer método de coaching para traders a través de Jose Luis Cases Lozano
Primer método de coaching para traders a través de Jose Luis Cases LozanoPrimer método de coaching para traders a través de Jose Luis Cases Lozano
Primer método de coaching para traders a través de Jose Luis Cases LozanoPullback.es
 

Andere mochten auch (20)

Presentación rcen qualys vulnerability management
Presentación rcen   qualys vulnerability managementPresentación rcen   qualys vulnerability management
Presentación rcen qualys vulnerability management
 
4 Best Practices for Patch Management in Education IT
4 Best Practices for Patch Management in Education IT4 Best Practices for Patch Management in Education IT
4 Best Practices for Patch Management in Education IT
 
Manos a la obra: Cómo dar grandes pasos en el marketing digital
Manos a la obra: Cómo dar grandes pasos en el marketing digitalManos a la obra: Cómo dar grandes pasos en el marketing digital
Manos a la obra: Cómo dar grandes pasos en el marketing digital
 
6.24.15
6.24.156.24.15
6.24.15
 
Los retablos en sevilla 1
Los retablos en sevilla 1Los retablos en sevilla 1
Los retablos en sevilla 1
 
BottleGame Presentation
BottleGame PresentationBottleGame Presentation
BottleGame Presentation
 
Mobile messaging solutions for online gaming companies
Mobile messaging solutions for online gaming companiesMobile messaging solutions for online gaming companies
Mobile messaging solutions for online gaming companies
 
Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...
Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...
Sesiones clinicas basadas en la evidencia 2014 - Sessió de Residents 2013-201...
 
Educación Vial
Educación VialEducación Vial
Educación Vial
 
Twig Embody - the wearable 3G/GSM/GNSS personal alarm device
Twig Embody - the wearable 3G/GSM/GNSS personal alarm deviceTwig Embody - the wearable 3G/GSM/GNSS personal alarm device
Twig Embody - the wearable 3G/GSM/GNSS personal alarm device
 
Teaching Software Engineering with Open Source Projects
Teaching Software Engineering with Open Source ProjectsTeaching Software Engineering with Open Source Projects
Teaching Software Engineering with Open Source Projects
 
Howard C. Williams good resume
Howard C. Williams good resumeHoward C. Williams good resume
Howard C. Williams good resume
 
UM ICT Road Map
UM ICT Road MapUM ICT Road Map
UM ICT Road Map
 
Sanjay_Saini-Resume
Sanjay_Saini-ResumeSanjay_Saini-Resume
Sanjay_Saini-Resume
 
Richa Industries Ltd
Richa Industries LtdRicha Industries Ltd
Richa Industries Ltd
 
Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for Cloud
 
Biblioteca Escolar Valenzuela
Biblioteca Escolar ValenzuelaBiblioteca Escolar Valenzuela
Biblioteca Escolar Valenzuela
 
Efectos de las aflatoxinas
Efectos de las aflatoxinasEfectos de las aflatoxinas
Efectos de las aflatoxinas
 
Anatomía cardiovascular por imagen
Anatomía cardiovascular por  imagenAnatomía cardiovascular por  imagen
Anatomía cardiovascular por imagen
 
Primer método de coaching para traders a través de Jose Luis Cases Lozano
Primer método de coaching para traders a través de Jose Luis Cases LozanoPrimer método de coaching para traders a través de Jose Luis Cases Lozano
Primer método de coaching para traders a través de Jose Luis Cases Lozano
 

Ähnlich wie QualysGuard InfoDay 2012 - QualysGuard Suite 7.0

Microsoft Techready -21 aprilie 2011
Microsoft Techready -21 aprilie 2011Microsoft Techready -21 aprilie 2011
Microsoft Techready -21 aprilie 2011Agora Group
 
Salesforce Cloud Security
Salesforce Cloud SecuritySalesforce Cloud Security
Salesforce Cloud Securitywaubin
 
Vm Ware Presentation Key Note
Vm Ware Presentation Key NoteVm Ware Presentation Key Note
Vm Ware Presentation Key Notecsharney
 
Microsoft Best Practices - AWS India Summit 2012
Microsoft Best Practices - AWS India Summit 2012Microsoft Best Practices - AWS India Summit 2012
Microsoft Best Practices - AWS India Summit 2012Amazon Web Services
 
Track and Trace Solution Details
Track and Trace Solution DetailsTrack and Trace Solution Details
Track and Trace Solution DetailsPropix Technologies
 
Cloud for Game Developers – Myth or Real Scenarios?
Cloud for Game Developers – Myth or Real Scenarios?Cloud for Game Developers – Myth or Real Scenarios?
Cloud for Game Developers – Myth or Real Scenarios?DevGAMM Conference
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroGraeme Wood
 
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudGraeme Wood
 
Get ready for tomorrow, today!
Get ready for tomorrow, today!Get ready for tomorrow, today!
Get ready for tomorrow, today!Harold Wong
 
Deploy, Scale and Manage your Microsoft Investments with AWS
Deploy, Scale and Manage your Microsoft Investments with AWSDeploy, Scale and Manage your Microsoft Investments with AWS
Deploy, Scale and Manage your Microsoft Investments with AWSAmazon Web Services
 
Romuald Zdebskiy (Microsoft) & Andrey Ivashentsev (Game Insight)
Romuald Zdebskiy (Microsoft) & Andrey Ivashentsev (Game Insight)Romuald Zdebskiy (Microsoft) & Andrey Ivashentsev (Game Insight)
Romuald Zdebskiy (Microsoft) & Andrey Ivashentsev (Game Insight)White Nights Conference
 
ACRN vMeet-Up EU 2021 - Introduction and Architecture Look Forward
ACRN vMeet-Up EU 2021 - Introduction and Architecture Look ForwardACRN vMeet-Up EU 2021 - Introduction and Architecture Look Forward
ACRN vMeet-Up EU 2021 - Introduction and Architecture Look ForwardProject ACRN
 
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready) ...
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready)  ...110531 newlease heads in the clouds feet on the ground v2.0 (partner ready)  ...
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready) ...New Lease
 
SPEC INDIA Java Case Study
SPEC INDIA Java Case StudySPEC INDIA Java Case Study
SPEC INDIA Java Case StudySPEC INDIA
 
Virtualization Map Tech Ed2009
Virtualization Map Tech Ed2009Virtualization Map Tech Ed2009
Virtualization Map Tech Ed2009rsnarayanan
 
Programatori cu capul in nori
Programatori cu capul in noriProgramatori cu capul in nori
Programatori cu capul in noriAlex Popescu
 
Vindicator Overview
Vindicator OverviewVindicator Overview
Vindicator Overviewdp3b58
 

Ähnlich wie QualysGuard InfoDay 2012 - QualysGuard Suite 7.0 (20)

RoadMap in the Cloud (2011)
RoadMap in the Cloud (2011)RoadMap in the Cloud (2011)
RoadMap in the Cloud (2011)
 
Microsoft Techready -21 aprilie 2011
Microsoft Techready -21 aprilie 2011Microsoft Techready -21 aprilie 2011
Microsoft Techready -21 aprilie 2011
 
Salesforce Cloud Security
Salesforce Cloud SecuritySalesforce Cloud Security
Salesforce Cloud Security
 
Vm Ware Presentation Key Note
Vm Ware Presentation Key NoteVm Ware Presentation Key Note
Vm Ware Presentation Key Note
 
Microsoft Best Practices - AWS India Summit 2012
Microsoft Best Practices - AWS India Summit 2012Microsoft Best Practices - AWS India Summit 2012
Microsoft Best Practices - AWS India Summit 2012
 
Track and Trace Solution Details
Track and Trace Solution DetailsTrack and Trace Solution Details
Track and Trace Solution Details
 
Resume
ResumeResume
Resume
 
Cloud for Game Developers – Myth or Real Scenarios?
Cloud for Game Developers – Myth or Real Scenarios?Cloud for Game Developers – Myth or Real Scenarios?
Cloud for Game Developers – Myth or Real Scenarios?
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
 
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The Cloud
 
Get ready for tomorrow, today!
Get ready for tomorrow, today!Get ready for tomorrow, today!
Get ready for tomorrow, today!
 
Deploy, Scale and Manage your Microsoft Investments with AWS
Deploy, Scale and Manage your Microsoft Investments with AWSDeploy, Scale and Manage your Microsoft Investments with AWS
Deploy, Scale and Manage your Microsoft Investments with AWS
 
Romuald Zdebskiy (Microsoft) & Andrey Ivashentsev (Game Insight)
Romuald Zdebskiy (Microsoft) & Andrey Ivashentsev (Game Insight)Romuald Zdebskiy (Microsoft) & Andrey Ivashentsev (Game Insight)
Romuald Zdebskiy (Microsoft) & Andrey Ivashentsev (Game Insight)
 
ACRN vMeet-Up EU 2021 - Introduction and Architecture Look Forward
ACRN vMeet-Up EU 2021 - Introduction and Architecture Look ForwardACRN vMeet-Up EU 2021 - Introduction and Architecture Look Forward
ACRN vMeet-Up EU 2021 - Introduction and Architecture Look Forward
 
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready) ...
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready)  ...110531 newlease heads in the clouds feet on the ground v2.0 (partner ready)  ...
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready) ...
 
SPEC INDIA Java Case Study
SPEC INDIA Java Case StudySPEC INDIA Java Case Study
SPEC INDIA Java Case Study
 
Virtualization Map Tech Ed2009
Virtualization Map Tech Ed2009Virtualization Map Tech Ed2009
Virtualization Map Tech Ed2009
 
Programatori cu capul in nori
Programatori cu capul in noriProgramatori cu capul in nori
Programatori cu capul in nori
 
Lets vRealize level -100 Presentation
Lets vRealize level -100 PresentationLets vRealize level -100 Presentation
Lets vRealize level -100 Presentation
 
Vindicator Overview
Vindicator OverviewVindicator Overview
Vindicator Overview
 

Mehr von Risk Analysis Consultants, s.r.o.

RAC DEAS - Univerzální SW nástroj k zajištění digitálních stop
RAC DEAS - Univerzální SW nástroj k zajištění digitálních stopRAC DEAS - Univerzální SW nástroj k zajištění digitálních stop
RAC DEAS - Univerzální SW nástroj k zajištění digitálních stopRisk Analysis Consultants, s.r.o.
 
RAC DEAT - Univerální HW nástroje pro zajištění digitálních stop
RAC DEAT - Univerální HW nástroje pro zajištění digitálních stopRAC DEAT - Univerální HW nástroje pro zajištění digitálních stop
RAC DEAT - Univerální HW nástroje pro zajištění digitálních stopRisk Analysis Consultants, s.r.o.
 
QualysGuard InfoDay 2014 - QualysGuard Continuous Monitoring
QualysGuard InfoDay 2014 - QualysGuard Continuous MonitoringQualysGuard InfoDay 2014 - QualysGuard Continuous Monitoring
QualysGuard InfoDay 2014 - QualysGuard Continuous MonitoringRisk Analysis Consultants, s.r.o.
 
QualysGuard InfoDay 2013 - Případová studie ČNB - QG WAS
QualysGuard InfoDay 2013 - Případová studie ČNB - QG WASQualysGuard InfoDay 2013 - Případová studie ČNB - QG WAS
QualysGuard InfoDay 2013 - Případová studie ČNB - QG WASRisk Analysis Consultants, s.r.o.
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...Risk Analysis Consultants, s.r.o.
 

Mehr von Risk Analysis Consultants, s.r.o. (20)

Best practice v testování zranitelností
Best practice v testování zranitelnostíBest practice v testování zranitelností
Best practice v testování zranitelností
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
Představení nástroje Nuix
Představení nástroje NuixPředstavení nástroje Nuix
Představení nástroje Nuix
 
FTK5 - HW požadavky a instalace
FTK5 - HW požadavky a instalaceFTK5 - HW požadavky a instalace
FTK5 - HW požadavky a instalace
 
Použití EnCase EnScript
Použití EnCase EnScriptPoužití EnCase EnScript
Použití EnCase EnScript
 
RAC DEAS - Univerzální SW nástroj k zajištění digitálních stop
RAC DEAS - Univerzální SW nástroj k zajištění digitálních stopRAC DEAS - Univerzální SW nástroj k zajištění digitálních stop
RAC DEAS - Univerzální SW nástroj k zajištění digitálních stop
 
RAC DEAT - Univerální HW nástroje pro zajištění digitálních stop
RAC DEAT - Univerální HW nástroje pro zajištění digitálních stopRAC DEAT - Univerální HW nástroje pro zajištění digitálních stop
RAC DEAT - Univerální HW nástroje pro zajištění digitálních stop
 
QualysGuard InfoDay 2014 - QualysGuard Continuous Monitoring
QualysGuard InfoDay 2014 - QualysGuard Continuous MonitoringQualysGuard InfoDay 2014 - QualysGuard Continuous Monitoring
QualysGuard InfoDay 2014 - QualysGuard Continuous Monitoring
 
QualysGuard InfoDay 2014 - Asset management
QualysGuard InfoDay 2014  - Asset managementQualysGuard InfoDay 2014  - Asset management
QualysGuard InfoDay 2014 - Asset management
 
QualysGuard InfoDay 2014 - WAS
QualysGuard InfoDay 2014 - WASQualysGuard InfoDay 2014 - WAS
QualysGuard InfoDay 2014 - WAS
 
QualysGuard InfoDay 2014 - Policy compliance
QualysGuard InfoDay 2014 - Policy complianceQualysGuard InfoDay 2014 - Policy compliance
QualysGuard InfoDay 2014 - Policy compliance
 
QualysGuard InfoDay 2014 - Vulnerability management
QualysGuard InfoDay 2014 - Vulnerability managementQualysGuard InfoDay 2014 - Vulnerability management
QualysGuard InfoDay 2014 - Vulnerability management
 
Použití hashsetů v EnCase Forensic v7
Použití hashsetů v EnCase Forensic v7Použití hashsetů v EnCase Forensic v7
Použití hashsetů v EnCase Forensic v7
 
Analýza elektronické pošty v EnCase Forensic v7
Analýza elektronické pošty v EnCase Forensic v7Analýza elektronické pošty v EnCase Forensic v7
Analýza elektronické pošty v EnCase Forensic v7
 
Vybrané funkce Forensic Toolkit 5 + RAC Forensic Imager
Vybrané funkce Forensic Toolkit 5 + RAC Forensic ImagerVybrané funkce Forensic Toolkit 5 + RAC Forensic Imager
Vybrané funkce Forensic Toolkit 5 + RAC Forensic Imager
 
QualysGuard InfoDay 2013 - Případová studie ČNB - QG WAS
QualysGuard InfoDay 2013 - Případová studie ČNB - QG WASQualysGuard InfoDay 2013 - Případová studie ČNB - QG WAS
QualysGuard InfoDay 2013 - Případová studie ČNB - QG WAS
 
QualysGuard InfoDay 2013 - Qualys Questionnaire
QualysGuard InfoDay 2013 - Qualys QuestionnaireQualysGuard InfoDay 2013 - Qualys Questionnaire
QualysGuard InfoDay 2013 - Qualys Questionnaire
 
QualysGuard InfoDay 2013 - Nové funkce QG
QualysGuard InfoDay 2013 - Nové funkce QGQualysGuard InfoDay 2013 - Nové funkce QG
QualysGuard InfoDay 2013 - Nové funkce QG
 
QualysGuard InfoDay 2013 - Web Application Firewall
QualysGuard InfoDay 2013 - Web Application FirewallQualysGuard InfoDay 2013 - Web Application Firewall
QualysGuard InfoDay 2013 - Web Application Firewall
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
 

Kürzlich hochgeladen

8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 

Kürzlich hochgeladen (20)

8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 

QualysGuard InfoDay 2012 - QualysGuard Suite 7.0

  • 1. QualysGuard Suite 7.0 Updates and New features Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe
  • 2. QualysGuard® SaaS Applications Enterprise SMB Freemium Services QualysGuard On Demand Portal Analyze Comply Monitor Prevent Vulnerability Mgmt. Policy Compliance Web Application Logs Web App. Firewall* Web App Scan PCI Compliance Botnet Detection* Malware Detection Qualys Seal SSL Labs SCAP / FDCC Zero days analyzer Compliance Mgmt* QualysGuard SaaS Technology Platform Scanners & Collectors Open APIs, Web Services & Integrations
  • 3. QualysGuard Architecture Updates Security Operations Center (SOC) Private Clouds (PC) Future SOC and PC EU SOC PC PC PC EU SOC US SOC PC PC PC US SOC PC PC PC PC SOC PC PC New Backup SOCs in US and EU
  • 4. QualysGuard Global Infrastructure Virtual vScanner and Virtual Private SOC QualysGuard SW Virtual Scanner QualysGuard SW Virtual Private SOC World’s Largest global Vulnerability Management deployment at Daimler - 293 scanner appliances scanning over a million IPs in 80 locations Performing 600+ Million IP scan and maps per year 4
  • 5. Private Cloud - @Customer HW SOC Qualys Supplied Hardware installed at customers premises Front Office UI Back Office UI QualysGuard API Virtualized Web Distribution Reporting JobD Bus • vmware and Application Layer Monitoring Logging • DB Audit Vault • Virtual Private DB Database Layer Reports Core Portal Platform • Redundant and Secure Network Core • High Availability • Redundant Service Infrastructure Infrastructure • Secure Network • Redundant Database Infrastructure Layer
  • 6. Private Cloud – Virtual SOC (Q2 2012) Customer Supplied Hardware Virtualization platform Front Office UI Back Office UI QualysGuard API • vmware Virtualized Web and Distribution Reporting JobD Bus Application Layer Monitoring Logging • DB Audit Vault Virtualized • Virtual Private DB Database Layer Reports Core Portal Infrastructure Layer Customer Infrastructure
  • 7. New QualysGuard Virtual Scanner Running on Virtualized platforms including laptops Supported Virtual Platforms: • Oracle Virtual Box (Open Source) • VMware ESXi, ESX, Workstation, Player, Fusion, vCenter, vSphere • Microsoft Hyper-V (Coming soon) • Citrix XenServer 6.0 (Coming soon) RESOURCES - MINIMUM • 1 x vCPU core • 1 GB RAM • 1 x 40GB virtual HDD RESOURCES - RECOMMENDED • 2 x vCPU cores • 4 GB RAM • 1 x 40GB virtual HDD CONFIDENTIAL | 7
  • 8. Password Vaults Integration Password Vaults Integration  For GQ authenticated scanning  Local encrypted credentials storage Very easy to implement  1 day project including C-A implementation  References: Rabobank, Discover, CNB Password Vaults Technologies  Cyber-Ark PIM Suite  Thycotic Secret Server  … others coming soon
  • 9. VeriSign VIP Two-factor Authentication 1) Download free SW Token 2) Edit user settings in QG https://vipmobile.verisign.com/supportedphones.v 3) Login with VeriSign VIP
  • 10. QualysGuard Web 2.0 UI Dynamic and Role Based UI Common User Experience Across all Applications − Interactive Dashboards − Context-based UI − Powerful Workflows − Actionable Menus & Filters 10
  • 11. QualysGuard Suite of Security & Compliance Applications 11
  • 12. QualysGuard Suite of SaaS Services AUTOMATE - Asset Management (ICT Asset Discovery, Tagging and Prioritization) - Risk Management (ICT Vulnerability Analyses, Remediation, Verification) - Compliance Management (ICT Configuration Standards and Audits) … by SaaS Service on your request, demand, price and scope! CONFIDENTIAL | 12
  • 13. Qualys Asset Management (patent pending) Powerful ability to manage, search and tag assets − Organizing ICT Assets using Tags - Static and Dynamic asset tagging - Hierarchical asset tagging − Uses existing VM scan data − Integrated with existing QG apps. Asset Tagging/Searching/Reporting based on - platforms, applications, services - IT responsibility - Based on locality - Based on Business Processes CONFIDENTIAL | 13
  • 14. Qualys Asset Management Host tagging & Web application tagging CONFIDENTIAL | 14
  • 15. Qualys Asset Management Reports by tags & User permissions by tags CONFIDENTIAL | 15
  • 16. QualysGuard Suite of SaaS Services AUTOMATE - Asset Management (ICT Asset Discovery, Tagging and Prioritization) - Risk Management (ICT Vulnerability Analyses, Remediation, Verification) - Compliance Management (ICT Configuration Standards and Audits) … by SaaS Service on your request, demand, price and scope! CONFIDENTIAL | 16
  • 17. Qualys Vulnerability Management New UI and Asset Tagging Market leader since 2008 Gartner, IDC, Forrester, Frost & Sullivan SC Magazine best Vulnerability Mgt solution 6 years in a row Full VM Cycle • Free and unlimited network discovery • Discover, group, & prioritize network assets • Identify vulnerabilities, exploits, malware, patches, & unsupported technologies • Prioritize, execute & audit remediation • Automate reporting, trending, & alerting 13,000+ signatures covering 55K+ vulnerabilities, updated daily
  • 18. Zero-Day Analyzer for VM GA – April in Europe Zero-Day Analyzer for VM Allows customers to analyze zero-day threats and estimate their impact on their assets and critical systems based on information collected from previous scan results. Benefits Latest signatures for iDefense exclusive zero- day threats Customizable alerting and email notifications Actionable data with estimates about what systems are at risk http://www.qualys.com/zero-day 18
  • 19. QualysGuard Suite of SaaS Services AUTOMATE - Asset Management (ICT Asset Discovery, Tagging and Prioritization) - Risk Management (ICT Vulnerability Analyses, Remediation, Verification) - Compliance Management (ICT Configuration Standards and Audits) … by SaaS Service on your request, demand, price and scope! CONFIDENTIAL | 19
  • 20. Qualys Policy Compliance Management New UI and Asset Tagging New Consultant customs Reports Golden Image Policy 2300+ controls over 50 platforms User controls for Win/Unix
  • 21. Customizable Questionnaires for PC Beta available Custom Questionnaires Enables customers to easily build questionnaires using the Unified Compliance Framework (UCF), as well as leverage existing business process workflows to evaluate controls, gather documents and evidence and validate compliance. Benefits Automation of manual assessments Ability to define/customize audit work flow Industry leading policy repository of nearly 1000 standards and regulations via UCF http://www.qualys.com/forms/questionnaires/ 21
  • 22. Free Premium Services and Qualys Open-Source research activities “QualysGuard Freemium Suite” CONFIDENTIAL | 22
  • 23. New Qualys FreeScan for Web Sites 5 External Scans for your Perimeter and Web site: • IP Vulnerability Scan • Web Application Vulnerability • Web Application Malware scan • Full Reporting functionality Register here: http://www.qualys.com/forms/freescan/
  • 24. Free BrowserCheck Business Edition Audit state of browsers security in the enterprise • Simple & Scalable • Multiple platform & browsers • Multiple Browser Plugins • Centralized Reporting • No SW/HW to install! Register here: http://www.qualys.com/forms/browsercheck- business-edition/
  • 25. Free SSL Lab Audit Service Audit implementation of SSL protocol on you Web • Certificate Validity and Trust • SSL Protocol version support • Encryption Cipher Strength • Encryption Key Exchange • SOLUTION description • Risk of Attack description Register here: http://www.ssllabs.com
  • 26. Qualys Global Community Join us at https://community.qualys.com Total Members 4500 4000 3500 3000 2500 2000 1500 1000 500 0 24.7 24.8 24.9 24.1 24.2 24.3 24.4 24.5 24.6 24.7 24.8 24.9 24.10 24.11 24.12 24.10 24.11 24.12 26
  • 27. CSO Interchange Events Coming to a City Near You http://www.csointerchange.org 27
  • 28. Qualys Security Conferences ‘12 Las Vegas, Munich, London and Paris http://www.qualys.com/qsc 28