Cloud Platform
Contact us
Asset Management
Vulnerability & Configuration Management
Risk Remediation
Threat Detection & Response
  • Overview
  • Platform Apps

  • Qualys Endpoint Security

    Advanced endpoint threat protection, improved threat context, and alert prioritization

  • Context XDR

    Extend detection and response beyond the endpoint to the enterprise

Cloud Security

Qualys Executives to Present on Laws of Vulnerabilities Research and Network Admission Control at the 2006 RSA Conference

Terry Ramos to Present Key 2005 Findings of Laws of Vulnerabilities Research; Seth Knox to Discuss Network Security Enforcement

* * * * * * * * * * * * * * * Media Advisory * * * * * * * * * * * * * * *


Dissecting the Trends of Security Vulnerabilities

For more than three years, Qualys has analyzed statistical vulnerability data from the largest real-world data set of network vulnerabilities, collected from 32 million live network scans. This ongoing research has led to the “Laws of Vulnerabilities,” which identifies network security trends, allowing organizations to proactively protect their networks from evolving attacks and compare their remediation efforts with the rest of the industry.

In this session, Terry Ramos, director of strategic development at Qualys, will present key findings to help predict and protect against attacks. Terry will discuss:

  • progress made in the time it takes to remediate vulnerable systems;
  • impact of the latest new vulnerabilities;
  • benefits of regular security patch advisories from vendors;
  • vulnerability of emerging wireless infrastructures.

Moving Security Enforcement into the Heart of the Network

Today’s network infrastructure is designed to move information traffic in a fast and reliable manner, but does not provide the necessary security enforcement capabilities to prevent attacks. This is beginning to change. Organizations realize that any system or device connected to a network can be the catalyst to a significant security incident. In this new environment, systems need to be validated before access is granted and then screened while given access.

In this session, Seth Knox, director of product marketing at Qualys, will:

  • discuss trends in security vulnerabilities from the industry’s largest real-world vulnerability dataset;
  • explain the concept of network admission architecture and its components;
  • provide lessons for attendees on how this architecture will protect networks and systems from evolving threats.


Terry Ramos
Director of Strategic Development, Qualys

Seth Knox
Director of Product Marketing, Qualys


Dissecting the Trends of Security Vulnerabilities
Wednesday, February 15th, 3:25 p.m.

Moving Security Enforcement into the Heart of the Network
Thursday, February 16th, 2006, 4:50 p.m.


McEnery Convention Center
San Jose, California


Rachel Kaseroff, Merritt Group

About Qualys

With more than 2,000 subscribers ranging from small businesses to multinational corporations, Qualys has become the leader in on demand vulnerability management and policy compliance. The company allows security managers to strengthen the security of their networks effectively, conduct automated security audits and ensure compliance with internal policies and external regulations. Qualys’ on demand technology offers customers significant economic advantages, requiring no capital outlay or infrastructure to deploy and manage. Its distributed scanning capabilities and unprecedented scalability make it ideal for large, distributed organizations. Hundreds of large companies have deployed Qualys on a global scale, including AXA, DuPont, Hershey Foods, ICI Ltd, Novartis, Sodexho, Standard Chartered Bank and many others. Qualys is headquartered in Redwood City, California, with European offices in France, Germany and the U.K., and Asian representatives in Japan, Singapore, Australia, Korea and the Republic of China. For more information, please visit at Booth 223 at CSI or online at


Qualys, the Qualys logo and QualysGuard are proprietary trademarks of Qualys, Inc. All other products or names may be trademarks of their respective companies.

Media Contact:
Tami Casey