Resource Center

Qualys

Contact Information

1600 Bridge Parkway

Redwood City,  CA.  94065

www.qualys.com

Business Description

Qualys (www.qualys.com) is a pioneer and leading provider of cloud security and compliance solutions with over 6,000 customers in more than 100 countries. The QualysGuard Cloud Platform and integrated suite of solutions help  organizations simplify security operations and lower the cost of compliance, delivering critical security  intelligence on demand.

Qualys

The QualysGuard suite of solutions enables organizations to automate the lifecycle of asset discovery, security  assessments, and compliance for IT systems and web applications. Designed since inception to be delivered through the cloud, it is easily and rapidly deployed on a global scale.

Threat and Vulnerability Management

Best Practices for Selecting a Vulnerability Management (VM) Solution

This checklist of best practices will save you time and help you understand what to look for when selecting a VM, whether you have a dozen systems or

Application Security

Best Practices for Selecting a Web Application Scanning (WAS) Solution

This checklist of best practices will save you time and help you understand what to look for when selecting a WAS solution, whether you have a handful

IT Compliance

How to Pass an IT Audit

This guide covers the steps and procedures to passing an IT GRC audit — as told by an enterprise end-user who deployed QualysGuard Policy Compliance.

Application Security

SANS Survey on Application Security Policies in Enterprises

With the growth of the Internet and the increasing reliance on web and mobile applications, it’s no surprise that data breaches associated with applic

Threat and Vulnerability Management

The Top 10 Reports for Managing Vulnerabilities

This paper cuts through the data overload generated by some vulnerability detection solutions and introduces The Top 10 Reports for Managing Vulnerabi

Application Security

Web Application Security: How to Minimize the Risk of Attacks

Vulnerabilities in web applications are now the largest vector of enterprise security attacks.

Most Recent Comments

IDG Connections

  • conect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • conect
  • conect
  • conect
  • conect
  • conect
no-image

Resource Center

  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/1432/exablox
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/1219/jama-software
  • /view_company_report/506/qualys

Poll

Are we heading for a cashless society?