All resources sponsored by:

Qualys, Inc.

12 Matches
PCI Compliance for Dummies
sponsored by Qualys, Inc.
EBOOK:Compliance with the Payment Card Industry (PCI) Data Security Standard (DSS) is mandatory if your company stores, processes, or transmits payment cardholder data. This book is all about understanding PCI and how merchants can comply with its requirements.
Posted: 21 Oct 2009 | Published: 21 Oct 2009
Get This Now


Avoiding 7 Common Mistakes of IT Security Compliance
sponsored by Qualys, Inc.
EGUIDE:This guide describes seven typical mistakes of IT security compliance and how you can use these lessons to help your organization achieve its compliance goals.
Posted: 21 Oct 2009 | Published: 01 Apr 2009
Get This Now


7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction
sponsored by Qualys, Inc.
WHITE PAPER:Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?
Posted: 20 Oct 2009 | Published: 20 Oct 2009
Get This Now


4 Key Steps to Automate IT Security Compliance: A Unified Approach for IT, Audit and Operation Teams
sponsored by Qualys, Inc.
WHITE PAPER:This paper discusses the challenges faced by organizations of all sizes - across all industries - and presents a security as a service (SaaS) approach to simplify and automate the convergence of security and compliance to define policies, ongoing assessments, mitigate risks and eliminate threats, and monitor compliance.
Posted: 06 Mar 2009 | Published: 06 Mar 2009
Get This Now


Oracle Global IT (GIT) Streamlined Security
sponsored by Qualys, Inc.
CASE STUDY:With QualysGuard Enterprise, Oracle GIT Security can monitor the company’s global vulnerability management process, track remediation, and validate policy compliance.
Posted: 10 May 2008 | Published: 01 Apr 2007
Get This Now


EBAY, Inc. - Securing the World's Online Marketplace with QualysGuard
sponsored by Qualys, Inc.
CASE STUDY:The automation built into QualysGuard immediately allowed eBay to do vulnerability assessments on demand, including rapid scans for the most recent vulnerabilities anywhere in its own network and in partner networks.
Posted: 10 May 2008 | Published: 10 May 2008
Get This Now


CIGNA Finds Good Therapy: Builds a More Efficient Risk Management, Streamlined Compliance, and System Security Program
sponsored by Qualys, Inc.
CASE STUDY:CIGNA turned to QualysGuard's on demand Web service appliance to automatically identify and more effectively mitigate system vulnerabilities and misconfigurations.
Posted: 10 May 2008 | Published: 01 Nov 2006
Get This Now


Vulnerability Management for GLBA Compliance
sponsored by Qualys, Inc.
PRODUCT LITERATURE:The QualysGuard vulnerability management and policy compliance solution helps financial institutions to meet many key security guidelines.
Posted: 10 May 2008 | Published: 01 Feb 2007
Get This Now


Online Demo - Vulnerability Management & Policy Compliance Overview
sponsored by Qualys, Inc.
SOFTWARE DEMO:Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
Posted: 09 Apr 2007 | Premiered: 09 Apr 2007
Get This Now


PCI Compliance Best Practices and Common Misconceptions - IT Briefing
sponsored by Qualys, Inc.
WHITE PAPER:This expert IT briefing by SearchSecurity describes the Payment Card Industry (PCI) standard, covers the standard's 12 specific requirements and details the nuances involved with meeting PCI guidelines.
Posted: 05 Apr 2007 | Published: 01 Apr 2007
Get This Now


Winning the PCI Compliance Battle
sponsored by Qualys, Inc.
WHITE PAPER:Learn about the payment card industry (PCI) including, participation and validation requirements, compliance requirements of PCI Data Security Standard, validation enforcement and the three important things to look for in a PCI network scanning service.
Posted: 19 Mar 2007 | Published: 01 Oct 2006
Get This Now


On-Demand Security Audit and Vulnerability Management - A Proactive Approach to Network Security
sponsored by Qualys, Inc.
WHITE PAPER:This paper explores the various approaches to network security and focuses on the unique role of vulnerability management and automated security audits. Learn about the four pillars of security and different approaches to vulnerability management.
Posted: 07 Nov 2006 | Published: 01 Sep 2006
Get This Now


12 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement