Automate & Simplify IT Policy Compliance
Qualys' on demand approach to IT security and compliance enables organizations of all sizes to successfully achieve both vulnerability management and policy compliance initiatives cohesively, while reducing costs and streamlining operations.
Control Objectives for Information and related Technology
Enable compliance with multiple COBIT controls and help auditors verify compliance with legislative mandates.
Federal Information Security Management Act
Protect sensitive information and meet FISMA compliance controls defined NIST SP 800-53 and, specifically CAG Control 10.
Health Insurance Portability and Accountability Act / Health Information Technology for Economic and Clinical Health Act
Meet key HIPAA/HITECH security and compliance requirements.
Information technology — Security techniques — Code of practice for information security management
Enable compliance with multiple control objectives and best practices of ISO/IEC 27002, which in turn help auditors to verify compliance with policy mandates for security.
North American Electric Reliability Corporation / Critical Infrastructure Protection
Fulfill NERC/CIP compliance requirements for scanning of vulnerabilities in critical cyber assets.
Payment Card Industry Data Security Standard
As an Approved Scanning Vendor (ASV), Qualys solutions directly fulfill the standard's requirements for quarterly scanning of vulnerabilities and helps you meet several other PCI requirements.
SANS Critical Controls
Automate the SANS 20 Critical Security Controls for a cost-effective security strategy that lowers risk by ensuring confidentiality, integrity and availability of information technology assets.
Security Content Automation Protocol
Federal agencies can scan and report compliance with standardized security configuration requirements using a centralized, integrated solution meeting SCAP requirements.