Learn to effectively navigate the security risks, new regulations, and new technologies on your journey to a secure and compliant digital transformation with this Qualys webcast series.
In this webcast, Jimmy Graham, Director of Product Management at Qualys, presented live demonstrations of Qualys Vulnerability Management, Asset Inventory, Threat Protection, and soon-to-be-released Patch Management.
You will see how these Qualys Cloud Apps allow you to:
• Continuously detect and protect against attacks anytime, anywhere
• Pinpoint your most critical threats and prioritize patching
• Maintain full, instant visibility of all your global IT assets
• Detect and patch vulnerabilities on IT systems and endpoints via Qualys Cloud Agents
Watch the on-demand recording: https://goo.gl/KqLpeo
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Webcast Series #2: Securing IT Assets by Prioritizing Protection and Remediation
1. Securing IT Assets by Prioritizing Protection and
Remediation
Jimmy Graham
Director of Product Management | Vulnerability Management
February 1, 2018
3. Qualys AssetView
Bring IT & Security together
Unified view of IT & security data
Search all hardware & software
inventory information in seconds
Simple but powerful
Customizable dashboards
3
6. Qualys Patch Management
Discover, correlate, and deploy
patches on Windows, Linux, and
Mac OS in one platform- anywhere
6
Patch Management
7. Collect
All types of assets
across all environments
Enrich
Automatically with
asset intelligence
Clean & Categorize
Eliminating data variance and
providing structure
Qualys Asset Management
15 February, 2018
Content Research
and Curation
Physical Virtual
Cloud Cloud
Agents
Passive
Scanning
Active
Scanning
Best-of-breed
Collection Sensors
Asset Data Asset Intelligence
IT Catalog
Talk about what controls are needed, how to select, why CIS etc
CIS controls approximately 4000
CIS technologies 55 by time we release
CIS policies 120 by the time we release
UPDATE NOTES:
NOTE: Pull some quotes and background slides for customer deck from RSA Charge decks, Verizon DBR, etc
Configuration issues are a major source of breaches, and basic hardening of all systems — whether on-premise or in the cloud — is required to protect today's complex environments.
“In the era of plug and play, rapid application development, one-click installations, and pressing business deadlines, systems are often put into production with default settings and without hardening,” said Gartner Research Analyst Prateek Bhajanka. “In such cases, readily available and approved baseline configuration standards can be used prior to deployment to ensure and maintain a standard and consistent configuration throughout the enterprise. This will not only help to achieve a better security posture, but also increased compliance and business effectiveness and efficiency.”
“Recent global cyber-attacks have served as a reminder that companies must take a proactive stance in securing the infrastructure and operations underpinning their digital transformation,” said Philippe Courtot, chairman and CEO, Qualys, Inc. “Qualys SecureConfig helps customers automate the security best practices behind leading benchmarks, and integrate them with DevSecOps for a more proactive approach towards securing today’s digital business.”
Talk about what controls are needed, how to select, why CIS etc
CIS controls approximately 4000
CIS technologies 55 by time we release
CIS policies 120 by the time we release
UPDATE NOTES:
NOTE: Pull some quotes and background slides for customer deck from RSA Charge decks, Verizon DBR, etc
Configuration issues are a major source of breaches, and basic hardening of all systems — whether on-premise or in the cloud — is required to protect today's complex environments.
“In the era of plug and play, rapid application development, one-click installations, and pressing business deadlines, systems are often put into production with default settings and without hardening,” said Gartner Research Analyst Prateek Bhajanka. “In such cases, readily available and approved baseline configuration standards can be used prior to deployment to ensure and maintain a standard and consistent configuration throughout the enterprise. This will not only help to achieve a better security posture, but also increased compliance and business effectiveness and efficiency.”
“Recent global cyber-attacks have served as a reminder that companies must take a proactive stance in securing the infrastructure and operations underpinning their digital transformation,” said Philippe Courtot, chairman and CEO, Qualys, Inc. “Qualys SecureConfig helps customers automate the security best practices behind leading benchmarks, and integrate them with DevSecOps for a more proactive approach towards securing today’s digital business.”
This document, Qualys' strategy and possible future developments are subject to change and may be changed by Qualys at any time for any reason without notice. This document is provided without a warranty of any kind, either express or implied, including but not limited to, the implied warranties of merchantability, fitness for a particular purpose, or non-infringement. The information in this document is confidential and proprietary to Qualys and may not be disclosed without the permission of Qualys. This document is for informational purposes and may not be incorporated into a contract.