All resources sponsored by:

Qualys

22 Matches
The Top 10 Reports for Managing Vulnerabilities
sponsored by Qualys
WHITE PAPER:This paper introduces 10 of the most important vulnerability management, organized across the four key steps in the vulnerability management lifecycle.
Posted: 17 Apr 2014 | Published: 17 Apr 2014
Get This Now


Security based on trust not fear
sponsored by Qualys
WHITE PAPER:This paper provides examples of how cloud services can be used to ensure Web applications and websites instill trust and confidence in the minds of customers.
Posted: 17 Apr 2014 | Published: 17 Apr 2014
Get This Now


Nine Steps to Smart Security for Small Businesses
sponsored by Qualys
WHITE PAPER:This white paper lists 9 steps to achieving smart security for small businesses and focuses on how a cloud security solution can benefit organizations without the resources for traditional security approaches.
Posted: 16 Apr 2014 | Published: 30 Dec 2011
Get This Now


Discovering Vulnerable Web Applications
sponsored by Qualys
WHITE PAPER:This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
Posted: 15 Apr 2014 | Published: 31 Aug 2012
Get This Now


The Big Shift to Cloud-based Security
sponsored by Qualys
WHITE PAPER:Access this resource to discover the benefits of cloud-based security, especially for small and medium-sized businesses (SMBs) who have fewer resources when mitigating increasing risks and compliance mandates.
Posted: 15 Apr 2014 | Published: 15 Apr 2014
Get This Now


Best Practices for Selecting a Web Application Scanning (WAS) Solution
sponsored by Qualys
WHITE PAPER:This informative guide explores best practices for choosing a Web application scanning solution.
Posted: 15 Apr 2014 | Published: 16 May 2013
Get This Now


Best Practices for Selecting a Vulnerability Management (VM) Solution
sponsored by Qualys
WHITE PAPER:This guide explores some best practices for deploying a VM solution and outlines how it is essential for your security strategy.
Posted: 15 Apr 2014 | Published: 16 May 2013
Get This Now


Automating the SANS 20 Critical Security Controls
sponsored by Qualys
WHITE PAPER:This guide explores security automation and how you can ensure system security with 4 main strategies.
Posted: 10 Apr 2014 | Published: 31 Mar 2013
Get This Now


Best Practices for Cloud Security
sponsored by Qualys
WHITE PAPER:In this essential white paper, discover the benefits that your organization can realize by embracing cloud services, including more effective and cost-efficient security. Also inside, discover cloud cautions and pitfalls to avoid – read on now to learn more.
Posted: 22 Jan 2013 | Published: 31 Jan 2012
Get This Now


The Urgent Need to rethink Security Using the Cloud
sponsored by Qualys
WHITE PAPER:This informative resource describes the many benefits that accompany the shift to a cloud-based security strategy. Discover how you can simplify, centralize, and enhance everything from endpoint security to compliance. Reduce web app vulnerabilities and manage threats with ease -- read on to learn more.
Posted: 18 Jan 2013 | Published: 28 Feb 2012
Get This Now


The Top 10 Reports for Managing Vulnerabilities
sponsored by Qualys
WHITE PAPER:Observing the complete lifecycle of vulnerability management begins with asset discovery. Learn more about the key steps for successful management with this informative resource. How can you improve your security?
Posted: 30 Jul 2012 | Published: 30 Jul 2012
Get This Now


Web Application Security: How to Minimize the Risk of Attacks
sponsored by Qualys
WHITE PAPER:This informative white paper outlines the importance of Web application security. With over 55 percent of vulnerabilities in 2010 resulting in attacks, a solution is necessary. Learn more about the different types of Web application vulnerabilities as well as how to detect vulnerabilities more efficiently.
Posted: 26 Jul 2012 | Published: 26 Jul 2012
Get This Now


Nine Steps to Smart Security for Small Businesses
sponsored by Qualys
WHITE PAPER:This guide uncovers nine simple steps for implementing smart security for your business. View now to explore why firewalls and anti-virus are not enough, and how to reduce risk while cutting costs.
Posted: 18 Oct 2011 | Published: 18 Oct 2011
Get This Now


Winning the PCI Compliance Battle
sponsored by Qualys
WHITE PAPER:This resource offers a guide for merchants and member services providers for meeting the requirements PCI DSS.
Posted: 17 Oct 2011 | Published: 17 Oct 2011
Get This Now


Web Application Security — How to Minimize Prevalent Risk of Attacks
sponsored by Qualys
WHITE PAPER:This guide surveys typical web application vulnerabilities, compares options for detection, and introduces the QualysGuard Web Application Scanning solution – a new on demand service from Qualys that automates detection of the most prevalent vulnerabilities in custom web applications.
Posted: 13 Jan 2011 | Published: 11 Jan 2011
Get This Now


Winning the PCI Compliance Battle: A Guide for Merchants and Member Service Providers
sponsored by Qualys
WHITE PAPER:The PCI Data Security Standard requirements apply to all payment card network members, merchants and service providers that store, process or transmit cardholder data. This guide will outline the six core requirement categories, participation and validation requirements, how to select a PCI networking testing service and more.
Posted: 11 Jan 2011 | Published: 11 Jan 2011
Get This Now


The Big Shift to Cloud-based Security
sponsored by Qualys
WHITE PAPER:Access this white paper to learn how small and medium-sized organizations can manage their IT risks and maintain regulatory compliance with minimal staff and budget, using cloud-based security.
Posted: 11 Jan 2011 | Published: 11 Jan 2011
Get This Now


Case Study: WebEx - Securing Web Collaboration
sponsored by Qualys
CASE STUDY:Read this case study to learn about the vulnerability and compliance risk management program WebEx has implemented to ensure security and confidentiality among their customers.
Posted: 18 May 2010 | Published: 18 May 2010
Get This Now


IT Policy Compliance for Dummies®
sponsored by Qualys
EBOOK:This book simply explains IT policy compliance and the steps your organisation needs to carry out to prove compliance to an independent auditor. After reading this book you'll know how to create compliance policies and prepare your IT operations to fulfill those requirements.
Posted: 28 Apr 2010 | Published: 28 Apr 2010
Get This Now


Web Application Security - How to Minimise Prevalent Risk of Attacks
sponsored by Qualys
WHITE PAPER:Read this white paper to understand how to minimise vulnerabilities in web applications. A guide to web application security outlines typical web application vulnerabilities and provides a comparison of web application vulnerability detection options.
Posted: 27 Mar 2009 | Published: 02 Mar 2009
Get This Now


Guide to Effective Remediation of Network Vulnerabilities and Policy Compliance
sponsored by Qualys
WHITE PAPER:This guide describes the major workflow processes of vulnerability management and how QualysGuard, as an on demand software-as-a-service automates most of these for fast, cost-effective remediation and compliance documentation.
Posted: 07 Nov 2008 | Published: 07 Nov 2008
Get This Now


7 Essential Steps of Network Security
sponsored by Qualys
WHITE PAPER:This paper details the essential aspects of putting into place a measurable and sustainable 7 step vulnerability management program, and demonstrates how QualysGuard automates everything you need along the way.
Posted: 07 Nov 2008 | Published: 07 Nov 2008
Get This Now


22 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement