User-agent: * Disallow: /2017/blackhat/reception/ Disallow: /403_forbidden.html Disallow: /404 Disallow: /asset/data Disallow: /asset/text Disallow: /asset/vendor Disallow: /company/search Disallow: /docs/IT_Policy_Compliance_for_Dummies.pdf Disallow: /docs/PCI-for-Dummies.pdf Disallow: /docs/QG_PCI_3-0_Tech_Brief.pdf Disallow: /docs/QG_PCI_Connect_DS.pdf Disallow: /docs/QG_PCI_Coverage.pdf Disallow: /docs/QG_PCI_DS_UK.pdf Disallow: /docs/Qualys_VM_Buyers_Checklist.pdf Disallow: /docs/VM-for-Dummies.pdf Disallow: /docs/WAS-for-Dummies.pdf Disallow: /docs/eula.pdf Disallow: /docs/master-cloud-service-agreement.pdf Disallow: /docs/service-description.pdf Disallow: /docs/service-level-agreement.pdf Disallow: /docs/version Disallow: /docs/vm-for-dummies-2nd-edition.pdf Disallow: /docs/w-9.pdf Disallow: /docs/whitepapers Disallow: /emails Disallow: /forms/partners Disallow: /forms/register-lead Disallow: /forms/trials/iframe Disallow: /forms/trials/pci-compliance-iframe Disallow: /header Disallow: /lib Disallow: /lp Disallow: /marketo Disallow: /nasdaq-investor-relations Disallow: /quazam Disallow: /videos/2017/qsc/sessions Disallow: /2017/blackhat/reception/confirm Disallow: /2017/qsc/register/berlin/confirm Disallow: /2017/qsc/register/confirm Disallow: /2017/qsc/register/dubai/confirm Disallow: /2017/qsc/register/london/confirm Disallow: /2017/qsc/register/mumbai/confirm Disallow: /2017/qsc/register/munich/confirm Disallow: /2017/qsc/register/paris/confirm Disallow: /2017/rsac/reception/confirm Disallow: /company/contacts/confirm Disallow: /forms/analyst-report/securosis-vulnerability-management-evolution/confirm Disallow: /forms/briefs/pci_scanning_requirements/confirm Disallow: /forms/browsercheck-business-edition/confirm Disallow: /forms/consultant-inquiry/confirm Disallow: /forms/ebook/it-policy-compliance-for-dummies/confirm Disallow: /forms/ebook/pci-compliance-for-dummies/confirm Disallow: /forms/ebook/vulnerability-management-for-dummies/confirm Disallow: /forms/ebook/web-application-security-for-dummies/confirm Disallow: /forms/freescan/confirm Disallow: /forms/freescan/owasp/confirm Disallow: /forms/freescan/patch-tuesday/confirm Disallow: /forms/freescan/scap/confirm Disallow: /forms/freescan/website-scan/confirm Disallow: /forms/guides/better-security-cloud/confirm Disallow: /forms/guides/fisma_compliance/confirm Disallow: /forms/reports/breaches-rise-control-systems-sans-survey/confirm Disallow: /forms/reports/sans-enterprise-application-security-policy-survey-report/confirm Disallow: /forms/top-4-security-controls/confirm Disallow: /forms/whitepapers/2015-state-application-security/confirm Disallow: /forms/whitepapers/7-compliance-fehler-vermeiden/de/confirm Disallow: /forms/whitepapers/best-practices-auswahl-schwachstellenmanagement-losung/de/confirm Disallow: /forms/whitepapers/best-practices-auswahl-web-application-scanning-losung/de/confirm Disallow: /forms/whitepapers/best-practices-selecting-vulnerability-management-solution/confirm Disallow: /forms/whitepapers/best-practices-selecting-web-application-scanning-solution/confirm Disallow: /forms/whitepapers/building_was_program/confirm Disallow: /forms/whitepapers/cisco-2017-annual-cybersecurity-report/confirm Disallow: /forms/whitepapers/cloud-based-it-asset-inventory-solid-foundation-infosec-infrastructure/confirm Disallow: /forms/whitepapers/continuous-monitoring-blueprint-achieving-continuous-security-compliance/confirm Disallow: /forms/whitepapers/continuous-security-monitoring/confirm Disallow: /forms/whitepapers/decouvrir-vulnerabilites-applications-web/fr/confirm Disallow: /forms/whitepapers/des-postes-de-travail-securises-pour-surfer-sur-le-web/fr/confirm Disallow: /forms/whitepapers/discovering-vulnerable-web-applications/confirm Disallow: /forms/whitepapers/efficient_ciso/confirm Disallow: /forms/whitepapers/eviter-7-erreurs-classiques-conformite-securite-it/fr/confirm Disallow: /forms/whitepapers/excel-security-assessments-without-excel-spreadsheets/confirm Disallow: /forms/whitepapers/gagner-bataille-conformite-pci/fr/confirm Disallow: /forms/whitepapers/gewinnen-kampf-um-pci-compliance/de/confirm Disallow: /forms/whitepapers/glba-compliance/confirm Disallow: /forms/whitepapers/grande-migration-securite-cloud/fr/confirm Disallow: /forms/whitepapers/grosser-wandel-cloud-sicherheit/de/confirm Disallow: /forms/whitepapers/hipaa-compliance/confirm Disallow: /forms/whitepapers/it-sicherheit-rechtfertigen/de/confirm Disallow: /forms/whitepapers/justifier-securite-it/fr/confirm Disallow: /forms/whitepapers/meilleures-pratiques-selectionner-solution-danalyse-des-applications-web/fr/confirm Disallow: /forms/whitepapers/meilleures-pratiques-selectionner-solution-gestion-des-vulnerabilites/fr/confirm Disallow: /forms/whitepapers/narrowing-security-gap-automated-configuration-assessment/confirm Disallow: /forms/whitepapers/postes-travail-securises-surfer-web/fr/confirm Disallow: /forms/whitepapers/prioritizing-vulnerability-remediation-age-of-threat-disclosure-overload/confirm Disallow: /forms/whitepapers/qualys-guide-automating-cis-20-critical-controls/confirm Disallow: /forms/whitepapers/reducing-attack-surface-sans-second-2016-survey-continuous-monitoring-programs/confirm Disallow: /forms/whitepapers/sans-2017-threat-landscape-survey-users-front-line/confirm Disallow: /forms/whitepapers/sans-cloud-security-survey-report-2017/confirm Disallow: /forms/whitepapers/sans-critical-security-controls/confirm Disallow: /forms/whitepapers/sans-cyber-security-trends-increase-security-2017/confirm Disallow: /forms/whitepapers/sans-state-cybersecurity-healthcare-organizations/confirm Disallow: /forms/whitepapers/schutzen-sie-ihre-pcs-beim-websurfen/de/confirm Disallow: /forms/whitepapers/sechs-kernelemente-der-webanwendungssicherheit/de/confirm Disallow: /forms/whitepapers/securite-basee-confiance-pas-sur-peur/fr/confirm Disallow: /forms/whitepapers/security-based-on-trust-not-fear/confirm Disallow: /forms/whitepapers/securosis-evolution-gestion-vulnerabilites/fr/confirm Disallow: /forms/whitepapers/securosis-schwachstellenmanagement-evolution/de/confirm Disallow: /forms/whitepapers/sicherheit-durch-vertrauen-statt-angst/de/confirm Disallow: /forms/whitepapers/six-elements-essentiels-securite-applications-web/fr/confirm Disallow: /forms/whitepapers/six-essential-elements-web-application-security/confirm Disallow: /forms/whitepapers/six-steps-stronger-security-smbs/confirm Disallow: /forms/whitepapers/smb-shift-cloud-security/confirm Disallow: /forms/whitepapers/strategien-erfolgreicher-ciso/de/confirm Disallow: /forms/whitepapers/strategies-efficaces-rssi/fr/confirm Disallow: /forms/whitepapers/top-5-requirements-prioritizing-vulnerability-remediation/confirm Disallow: /forms/whitepapers/top-6-security-use-cases-automated-asset-inventory/confirm Disallow: /forms/whitepapers/unsichere-webanwendungen-ermitteln/de/confirm Disallow: /forms/whitepapers/winning_pci_compliance_battle/confirm Disallow: /forms/whitepapers/zero-day-offense-vulnerability-management/confirm Disallow: /forms/whitepapers/zero-day-offense-vulnerability-management/de/confirm Disallow: /forms/whitepapers/zero-day-offense-vulnerability-management/fr/confirm Disallow: /free-trial/confirm Disallow: /free-trial/iframe/confirm Disallow: /lp/analyze-prioritize-mitigate-security-risks-real-time/confirm Disallow: /lp/conformite-pci-rapide-simple/fr/confirm Disallow: /lp/continuous-monitoring-perimeter/confirm Disallow: /lp/fast-simple-network-security/confirm Disallow: /lp/fast-simple-pci-compliance/confirm Disallow: /lp/fast-simple-vulnerability-management/confirm Disallow: /lp/fast-simple-web-application-scanning/confirm Disallow: /lp/gestion-vulnerabilites-rapide-simple/fr/confirm Disallow: /lp/schnelle-einfache-pci-compliance/de/confirm Disallow: /lp/schnelles-einfaches-schwachstellenmanagement/de/confirm Sitemap: https://blog.qualys.com/sitemap.xml Sitemap: https://community.qualys.com/sitemap.xml Sitemap: https://www.qualys.com/sitemap.xml