Search

See Resources

Webcasts


These brief webcasts offer best practices and thought leadership on a variety of security and compliance topics, including vulnerability management, PCI compliance, web application scanning, and malware detection.


All

Upcoming Webcasts

Aligning Web Application Security with DevOps and IoT Trends

As the proliferation of IoT devices complicates the web app security landscape, security teams must engage with key app development counterparts to better secure apps across new types of devices, without slowing rapid DevOps methods or adding InfoSec strain. During this webcast, guest speakers Amy DeMartine from Forrester, and Jason Kent from Qualys will discuss how to secure apps at the speed of DevOps, utilise web security and infrastructure security assessment practices in the age of IoT, and mitigate the risk presented by the new IoT attack surface.

Recorded Webcasts

Securing Your Web Apps in Today's Complex Cloud Environment

Securing web applications has become more complex as organizations increasingly deploy and manage their web applications in the cloud. During this webcast Alex Jones from Gainsight and Dave Ferguson from Qualys will discuss how Qualys has helped Gainsight to, scan, discover, catalog applications on multiple cloud environments for vulnerabilities and website misconfigurations, adapt to increasingly complex and new web application technologies and build an easy-to-use, accurate and scalable scanning program across web application and network infrastructure.

Overcome Outdated Processes and Automate IT Risk & Compliance

As IT, business, and regulatory environments grow increasingly complex, risk and compliance pros must move past outdated processes and legacy systems to innovate and find ways to achieve higher degrees of efficiency and oversight. Join guest speakers Nick Hayes, Analyst at Forrester, and Josh Hankins, Information Security Solutions Manager at 84.51° as they present how you can, move up the maturity curve through better program coordination and technology integration, establish the right metrics to build the business case and showcase continual progress and bolster future success by prioritising business agility and data mastery as top strategic objectives.

Excel at Your Security Assessments Without EXCEL Spreadsheets

Join this webcast to learn how you can streamline your vendor and IT risk audits with a centralized solution. Traditionally security assessment surveys are implemented via email and using Excel spreadsheets. This is a manual, time-consuming method that invites errors and omissions. Qualys Security Assessment Questionnaire (SAQ) allows you to manage the assessment processes effectively, by automating these surveys to ensure the process is agile, accurate, comprehensive, centralized, scalable and uniform.

Improving on "Whack-a-Mole" Vulnerability Management

The need to prioritize vulnerability management (VM) is greater than ever as IT security teams become overwhelmed with trying to protect against every threat that pops up. Join guest speaker Joseph Blankenship, Senior Analyst at Forrester, and Jimmy Graham, Director of Product Management at Qualys as they discuss Forrester data trends and insights from real-world client scenarios, why vulnerability management needs to be prioritized and Qualys will discuss how ThreatPROTECT shows you what to remediate first.

Prioritize and Remediate your Vulnerabilities with Qualys ThreatPROTECT

Qualys’ newest solution ThreatPROTECT correlates vulnerability data with a Live Threat Intelligence Feed from multiple industry sources, providing customers with an easy-to-understand dashboard that provides clear insight into which vulnerabilities to fix first. During this webcast presenters Wolfgang Kandek, and Tim White, will show you how you can use ThreatPROTECT to quickly identify your most important assets and critical vulnerabilities allowing you to prioritize your remediation efforts.

Vulnerability Detection in Today's Mobile Workforce

Getting to know your current vulnerability data from your mobile workforce is a difficult task. If the mobile devices are not on the network at the time of your scan your data could become out of date by weeks or even months. Join this webcast to discover how Synovus Bank use Qualys Cloud Agent to perform frequent vulnerability scans for all internal and external assets, receive faster notification and remediation for zero day and critical threats and improve their vulnerability analysis and security patching programs by providing data that can be used to prioritize patch distribution.

Detect All Your IT Assets in SECONDS

A huge hurdle to protect your network is knowing exactly what devices are connected. This information is vital for quickly finding and fixing vulnerabilities. Join this webcast to discover how to run instant queries that return results in seconds, search for OS and App configuration information on all your assets for fast, accurate and actionable data and get a unified view of your IT and Security data.

Cloud Without Borders - High-Confidence, Secure Computing: Anytime & Anywhere

Powerful technologies from the core to the edge are enabling new insights and transforming value creation. But these opportunities create new risks and urgently beg for innovative approaches to securing our most precious information.
Learn how a new architecture of cloud security expertise, endpoints and apps will enable high-confidence computing and deliver security and privacy anywhere, anytime.

Mastering Vulnerability Management with A Risk-based Approach

To effectively prioritize and remediate the most critical vulnerabilities threatening your organization, you need to combine internal asset risk evaluation with external real-time exploit and threat intelligence to create the most accurate picture of incidence and impact.
Join this webcast to learn how Qualys and Brinqa provide all the tools you need to dramatically improve the effectiveness and performance of your vulnerability management program.

The ABCs of The Pragmatic CISO: Assets, Borderless-ness, and Compliance

With cyber security taking the front seat in the boardroom, CISOs now have more visibility than ever before. But, many are struggling to gain the visibility they need to be effective and searching for practical techniques to gain full control over their assets for continuous security and compliance.
Join this webcast where we'll cover the ABCs of being a pragmatic CISO.

A New Level of Visibility And Certainty for Security Professionals

Do you want to be able to answer questions like these quickly and with confidence?

  • Which of your vulnerabilities are actively being exploited?
  • What unauthorized software is installed on your assets?
  • Join this webcast to discover how you can get a new level of visibility and certainty using a free asset inventory product from Qualys.

Top Takeaways for National Cyber Security Awareness Month

In this 30-minute webcast, industry experts Mike Rothman, President of Securosis Research and Wolfgang Kandek, CTO of Qualys will share their top recommendations for making the most of National Cyber Security Awareness Month. With data breaches in the headlines of nearly every online magazine, it’s never been a better time to maximize cyber security awareness and translate it into pragmatic results for the enterprise.

Applying Actionable Threat Intelligence to Your Vulnerability Management Program

Adding real-time threat context to your vulnerability and remediation management enables you to prioritize the most critical vulnerabilities at the right time, and reduce your exposure to threats. If you can automate this process, all the better: you're able to quickly and confidently remediate the right vulnerabilities. This live webcast will showcase how Qualys and Kenna together connect an organization’s vulnerability scanning program with actionable threat intelligence to employ a risk-based approach to vulnerability management.

Addressing Web Application Vulnerability with Integrated, Continuous Protection

In 2015 Gartner Magic Quadrant for Application Security Testing, Qualys was positioned highest in the "Ability to Execute" within the "Challengers" quadrant. Introducing virtual patching in the recent release of Qualys Web Application Firewall, Qualys now brings an end-to-end solution to web application security, delivering an integrated web application scanning and firewall that discovers, catalogs and protects all of your web applications wherever they reside — on premise or in the cloud. Find out how Qualys can help you implement web application security throughout your systems development lifecycle (SDLC).

Visibility and Actionable Data Across Millions of IT Assets in Seconds

Knowing what IT assets you have and how to protect them is increasingly a challenge as globalization, virtualization and mobile assets create new endpoints and new opportunities for hackers to infiltrate. Now you can move beyond traditional scanner-based approaches to strengthen endpoint security with a free solution from Qualys. Discover how Qualys AssetView gives you a fast, actionable view of all IT assets while helping to maintain security and compliance organization-wide.

Qualys Express - Part 3: How to Catalog and Scan All of Your Web Apps for Vulnerabilities

In this webcast, we will look into some easy steps you could take to run vulnerability scans against web applications. We will show you step-by-step how to configure Qualys Web Application Scanning, execute discovery and vulnerability scans, as well as run reports and create a strategy for remediation.

Qualys Express - Part 2: Proactively Secure Both Perimeter and Internal IT Assets with Continuous Monitoring

In this webcast, we will cover a few steps you could take to identify and filter on key events and/or vulnerabilities and quickly alert the proper staff to take action before the attackers do. We will show you how to deploy rules (whitelists and blacklists), set the system to detect important changes (new hosts, nearly expired certificates, etc), as well as deliver alerts to any users or systems that need to know.

Qualys Express - Part 1: Setup for Success with Vulnerability Management

In this webcast, we will go over Qualys hardware and virtual scanner appliances for internal and external vulnerability scans. We will then demonstrate how you can discover various assets in your network, prioritize them, execute vulnerability scans, and generate reports that would suit your needs.

NHS Dumfries & Galloway: Building the Business Case for Mitigating Risks

Join Gordon Wallace, Technical Manager at Qualys, and Andrew Turner, Head of Information Assurance and Security at NHS Dumfries & Galloway for this informative webcast. You’ll see how the IT department of NHS Dumfries & Galloway secures its IT systems for all medical facilities and data centres in the region—including 1,000 general practitioners and 4,500 staff.

Getting Started with Qualys Express Lite - Part 2: Web Application Scanning

In this webcast, we will look into some easy steps you could take to run vulnerability scans against web applications. We will show you step-by-step how to configure Qualys Web Application Scanning, execute discovery and vulnerability scans, as well as run reports and create a strategy for remediation.

Next-Gen Vulnerability Management with Cloud Agent

As global networks evolve, traditional assessment methods present many challenges for security teams such as scanning windows, managing credentials, and the rise of cloud environments. Learn more about the next phase of security assessment and how Qualys Cloud Agent instantly turns on full access to the power of Qualys vulnerability management and policy compliance. See how to extend the power of the Qualys Cloud Platform anywhere in the world and on any host including laptops, desktops, servers or virtual machines.

Getting Started with Qualys Express Lite - Part 1: Vulnerability Management

In this webcast, we will go over Qualys hardware and virtual scanner appliances for internal and external vulnerability scans. We will then demonstrate how you can discover various assets in your network, prioritize them, execute vulnerability scans, and generate reports that would suit your needs.

Web Application Security Trends and Solutions

Qualys and a guest from Forrester Research discuss in details the driving factors behind the increasing demand for web application security, trends in web application security, and key elements to implement best-in-class web application security programs.

Better Information Reveals Your High Risk Vulnerabilities

Join this webcast to learn how to get better information about the top vulnerabilities that need your attention and what to do about them. US-CERT Top 30 provides guidance that allows you to identify the most commonly exploited vulnerabilities and implement the right patches across your entire network.

Proactively Monitor Both Perimeter and Internal IT Assets

Qualys’ popular Continuous Monitoring (CM) solution now includes internal monitoring capabilities to enable you to proactively monitor and get real-time alerts for critical internal IT assets (e.g. desktops, servers and other devices) to identify potential threats, while accelerating incident response time. Find out more in this webcast.

Virtual Patching: End-to-End Web Application Security Cloud Service

Find out how the new release of Qualys WAF 2.0 provides an end-to-end solution that combines web application scanning and web application firewall to effectively detect and mitigate vulnerabilities.

Best Practices for PCI Compliance

Join Qualys for a webcast to hear more about some practical steps to steer your company into compliance and create a solid defense against the latest threats to cardholder data.

Introducing the Cloud Agent Platform

Join this webcast to find out about the Qualys Cloud Agent Platform (CAP). A revolutionary new platform that extends Qualys’ industry-leading Cloud Security and Compliance Platform with lightweight agents to continuously assess security and compliance of your global IT infrastructure and applications.

Live Q&A Session: Detecting & Addressing Unsafe SSL Configurations

Following the success of our recent SSL webcast, “Detecting & Addressing Unsafe SSL Configurations”, we’re happy to announce a live follow up Q&A session with Wolfgang Kandek, CTO and Ivan Ristić, Author and Director of Application Security Research at Qualys. The webcast will begin with a recap on the current state of SSL encryption and how major problems are being addressed as covered in the initial session which can be viewed here. This will be followed by a thirty minute Q&A session where you can put any of your SSL security concerns and questions to our presenters for an expert response.

Detecting and Addressing Unsafe SSL Configurations

As a security professional, you are on constant alert for external threats. But many breaches are caused internally by incorrect configuration of IT resources, including SSL. To help improve how encryption is used, Qualys created a research project called SSL Labs to address two major problems of the ecosystem: lack of tools and documentation. Join Qualys for a webcast to hear more about the current state of SSL encryption and how major problems are being addressed.

Did you know? You can easily respond to constantly evolving Internet attacks.

With attacks on the rise and constantly changing, it’s more important than ever to respond fast. Find out how Qualys Vulnerability Management gives you a new approach to continuously secure your IT infrastructure with immediate, global visibility against evolving threats. Join this webcast to discover real-world examples of the automated solution trusted by thousands of organizations worldwide.

Did you know? More visibility of your IT assets enables better IT security.

If you could see your network assets the way hackers do, you’d know a lot more about your vulnerabilities. To secure your information systems requires control and continuous visibility of the entire network and its various components. Join this webcast to discover how Qualys ensures maximum visibility and the most accurate view of your network security.

Preventing Web App Attacks with Progressive Scanning

Join us to learn how Qualys WAS 4.0 with Progressive Scanning provides organizations like ThousandEyes with powerful new capabilities to enhance testing coverage and provide flexible scan scheduling, reducing the burden on understaffed IT security teams.

Did you know? You can find and fix vulnerabilities before hackers attack!

Constantly evolving threats can be more difficult to counter—unless you have full visibility into potential vulnerabilities of your infrastructure. Built on the leading cloud security and compliance platform, Qualys gives you immediate, global visibility of IT vulnerabilities with continuous monitoring. Join this webcast to discover more.

Get Complete IT Compliance: Reduce Risk and Cost

Join Qualys and BMC to learn more about the first solution to tie vulnerability information to automated remediation actions. This dramatically reduces the window of vulnerability while simultaneously improving IT operational performance. In this webcast you will learn how you can mitigate the SecOps gap.

Best Practices for IT Configuration Compliance

Join us to learn how to reduce risk from incorrect configuration of IT resources with an easy, automated solution to maintain correct settings.

Maximizing Coverage with Progressive Scanning

While automated web application scanning provides organizations with the most cost effective way to identify security vulnerabilities such as the OWASP top 10, most web application scanners scan the same functionality — even if you run multiple scans. Join us for this webcast to learn how progressive scanning highlights the importance of coverage of application functionality and increases safety.

Cloud Security and Compliance Solution for SMB

According to a recent threat report, the largest growth area for targeted attacks was businesses with fewer than 250 employees. Typically SMBs are extremely resource constrained and just like large enterprises, SMBs also face a myriad of regulations that they must comply such as HIPAA and PCI. Join our guest Forrester’s Principal Analyst for Security & Risk, Rick Holland and Qualys CISO, Jonathan Trull for a webcast on cloud security solution and compliance for SMB.

Vulnerability Scanning That Never Stops

As businesses evolve and the rate of change and attacks increase, standard vulnerability scanning techniques are no longer efficient. Now get a comprehensive view of your network so you can identify and address threats and weaknesses before hackers do.

How to Prevent the Next Shellshock

Between the recent Shellshock vulnerability and the web CGI based attack vectors, attackers are always finding new ways to take control of vulnerable web servers. Join us for this webinar for a review of how a Web Application Firewall can protect you.

Revealing Web Application Vulnerabilities

Vulnerabilities like Shellshock can expose unauthenticated attack vectors and increase risk to your organization—especially if you can’t fully assess your web applications. In this webcast, learn how to increase security with an automated process for testing web applications for vulnerabilities.

Driving Remediation of Control Deficiencies

With today’s complex and changing IT environments, driving effective remediation by prioritizing efforts where they have the most impact is a must. Learn effective methods that successful organizations use to get the most impact from their remediation efforts.

Building an Automated Compliance Program

If you’re looking to reduce the effort, time and cost of assessing systems throughout your network to maintain compliance and increase security, you won’t want to miss this informative webcast. Learn a straight-forward way to build an automated compliance program at your organization by following key best practices and critical tasks for setting up and automating your control assessment program.

Importance of Automated Controls Assessment

With multiple mandates, constantly changing IT environments and a vast and evolving threat landscape—maintaining compliance requires measurable and enforceable controls. Now you can reduce risk and continuously comply with internal policies and external regulations.

Shellshock: Detect and Defend with Qualys

Shellshock vulnerability represents a serious threat to most organizations—requiring a swift and thorough response. Now learn more about it and what you can do to reduce your risk from different attack vectors using an automated and systematic approach.

Preventing Breaches with Qualys Continuous Monitoring

Jonathan Trull and Tony Sager demonstrate how to take back the offensive by getting inside your adversaries decision cycle including how to configure non-intrusive yet impactful daily scans that scale to millions of IP addresses spread across the globe; and the key operational aspects of moving to continuous monitoring.

PCI DSS v3: Scanning and Penetration Testing Implications

Join John Hetherton (QSA) of Espion and Gordon Caulfield (SME) of Qualys as they discuss the key changes in PCI DSS Version 3.0, examine penetration testing methodology from the auditor's point of view, and how you can maintain compliance.

The Case for Continuous Vulnerability Assessment and Remediation

Qualys CISO Jonathan Trull and Tony Sager, Chief Technologist for the Council on CyberSecurity review the historical evolution of vulnerability scanning and remediation, outline common obstacles to continuous monitoring and review strategies for overcoming them, and demonstrate the importance of getting inside your adversary's Observe-Orient-Decide-Act (OODA) loop.

Web Application Threats and Trends

This webcast reviews recently published web application threat intelligence from IBM, Verizon and Symantec to provide a current view of the web application threat landscape. The changing methods and motives of attackers will be reviewed as will the best practice methods for detecting and defending against the risks these threats represent.

Using Qualys Reporting Tools to Effectively Manage and Monitor Vulnerability Patching

In the webcast, Philip Niegos demonstrates the effective use of three Qualys Reporting Tools: 1) Patch Report, 2) Remediation Report, and 3) Vulnerability Scorecard Report, that can be combined to build a successful vulnerability detection and patch management solution from top to bottom.

Top 5 Vulnerability Management Mistakes

In this webinar, you'll learn how to avoid common vulnerability management mistakes to guard your business against a successful breach and improve your overall security risk posture.

Managing Risk and Vulnerabilities in a Business Context

In this webcast, our panel of experts discuss how to shift from viewing IT risk in bits and bytes to having an impact on critical applications in the data centre.

Avoid a Breach: Using Authenticated Scanning to Uncover Hidden Security Vulnerabilities

In this webinar, join security experts Jonathan Cogley, CEO at Thycotic and Ben Yoder, Product Manager at Thycotic, Parag Baxi, Director Product Management at Qualys to learn how authenticated scanning can not only immediately increase your company's security posture by detecting deeper vulnerabilities, but also improve regulatory compliance procedures to ensure network protection against a future breach.

Uncover Threats in Your Perimeter in Minutes, not Hours:
Use Immediate Alerts - Instead of Long Reports

In this interactive webinar, you'll learn a new way to quickly and easily get ahead of today's real-world threats such as Heartbleed (and whatever comes next), hidden SSH "moles," and expiring SSL certificates. A live demo will show you how to use immediate alerts to accelerate your security – and get rid of the pain and delays of dealing with huge reports!

Automating Secure Configuration Assessment Best Practices

In this webcast we discuss how effective configuration control are implemented to minimise security risks associated with poor configuration settings, how SaaS-based automation is a key success factor in applying performance, and we will have a quick demonstration of Qualys policy compliance.

From Vulnerability Assessment to Vulnerability Management Using the Scan Report Template

In this webcast Nick Dlouhy, reviews how to use the Qualys scan report template

Automating Secure Configuration Assessment Best Practices

In this webcast we discuss how effective configuration control are implemented to minimize security risks associated with poor configuration settings, how SaaS-based automation is a key success factor in applying performance, and we will have a quick demonstration of Qualys policy compliance.

A Post-Mortem on Heartbleed - What Worked and What Didn't:
Real-world case study on how NHS Dumfries & Galloway responded to this critical vulnerability.

In this webinar we describe the inner workings of the flaw, detail the detection mechanisms used by Qualys, and cover less-visible instances of Heartbleed that you might be missing. Andrew Turner, Head of Information Assurance and Security for NHS Dumfries & Galloway, will describe how they are taking on Heartbleed.

A Post-Mortem on Heartbleed - What Worked and What Didn't:
Real-world case study on how the State of Colorado responded to this critical vulnerability

In this webinar we describe the inner workings of the flaw, detail the detection mechanisms used by Qualys, and cover less-visible instances of Heartbleed that you might be missing. The State of Colorado provide a real-world perspective, the CISO of the State of Colorado Jonathan Trull will describe how the state is taking on Heartbleed.

Discover your Network using Qualys Asset Tagging and Management

In this webcast learn the changes to the latest top 10 list and how to interpret difference between vulnerabilities, exploits, and weaknesses.Phil Niegos, senior technical trainer at Qualys will demonstrate how easily asset management can be setup and configured within Qualys

Reviewing the Latest OWASP Top 10

In this webcast learn the changes to the latest top 10 list and how to interpret difference between vulnerabilities, exploits, and weaknesses.

Strong Security Drives Compliance

In this webcast learn how aging infrastructures, ongoing cyber threats, and lack of actionable information are being solved by organizations in the energy sector.

Managing Risk and Vulnerabilities in a Business Context

In this webcast, our panel of experts discuss how to shift from viewing IT risk in bits and bytes to having an impact on critical applications in the data center.

Back to the Basics - PCI Validation

In this webcast, our panel of experts discuss the importance of consistent, program-level testing on your PCI environment.

CM

Recorded Webcasts

Qualys Express - Part 2: Proactively Secure Both Perimeter and Internal IT Assets with Continuous Monitoring

In this webcast, we will cover a few steps you could take to identify and filter on key events and/or vulnerabilities and quickly alert the proper staff to take action before the attackers do. We will show you how to deploy rules (whitelists and blacklists), set the system to detect important changes (new hosts, nearly expired certificates, etc), as well as deliver alerts to any users or systems that need to know.

Proactively Monitor Both Perimeter and Internal IT Assets

Qualys’ popular Continuous Monitoring (CM) solution now includes internal monitoring capabilities to enable you to proactively monitor and get real-time alerts for critical internal IT assets (e.g. desktops, servers and other devices) to identify potential threats, while accelerating incident response time. Find out more in this webcast.

Did you know? You can find and fix vulnerabilities before hackers attack!

Constantly evolving threats can be more difficult to counter—unless you have full visibility into potential vulnerabilities of your infrastructure. Built on the leading cloud security and compliance platform, Qualys gives you immediate, global visibility of IT vulnerabilities with continuous monitoring. Join this webcast to discover more.

Maximizing Coverage with Progressive Scanning

While automated web application scanning provides organizations with the most cost effective way to identify security vulnerabilities such as the OWASP top 10, most web application scanners scan the same functionality — even if you run multiple scans. Join us for this webcast to learn how progressive scanning highlights the importance of coverage of application functionality and increases safety.

Vulnerability Scanning That Never Stops

As businesses evolve and the rate of change and attacks increase, standard vulnerability scanning techniques are no longer efficient. Now get a comprehensive view of your network so you can identify and address threats and weaknesses before hackers do.

Preventing Breaches with Qualys Continuous Monitoring

Jonathan Trull and Tony Sager demonstrate how to take back the offensive by getting inside your adversaries decision cycle including:


  • How to configure non-intrusive yet impactful daily scans that scale to millions of IP addresses spread across the globe; automatically identify and filter on key events and/or vulnerabilities; quickly alert the proper staff to take action before the attackers do.
  • Discuss the key operational aspects of moving to continuous monitoring including the development of supporting policies and procedures, alignment of staff resources, and obtainment of executive and IT operational staff support and buy-in.
The Case for Continuous Vulnerability Assessment and Remediation

Qualys CISO Jonathan Trull and Tony Sager, Chief Technologist for the Council on CyberSecurity will:


  • Review the historical evolution of vulnerability scanning and remediation and provide real-world examples where continuous monitoring could have prevented breaches.
  • Outline common obstacles to continuous monitoring and review strategies for overcoming them.
  • Discuss the hacker mindset and demonstrate the importance of getting inside your adversary's Observe-Orient-Decide-Act (OODA) loop.

TP

Recorded Webcasts

Improving on "Whack-a-Mole" Vulnerability Management

The need to prioritize vulnerability management (VM) is greater than ever as IT security teams become overwhelmed with trying to protect against every threat that pops up. Join guest speaker Joseph Blankenship, Senior Analyst at Forrester, and Jimmy Graham, Director of Product Management at Qualys as they discuss Forrester data trends and insights from real-world client scenarios, why vulnerability management needs to be prioritized and Qualys will discuss how ThreatPROTECT shows you what to remediate first.

Prioritize and Remediate your Vulnerabilities with Qualys ThreatPROTECT

Qualys’ newest solution ThreatPROTECT correlates vulnerability data with Real-time Threat Indicators (RTI) from multiple industry sources, providing customers with an easy-to-understand dashboard that provides clear insight into which vulnerabilities to fix first. During this webcast presenters Wolfgang Kandek, and Tim White, will show you how you can use ThreatPROTECT to quickly identify your most important assets and critical vulnerabilities allowing you to prioritize your remediation efforts.

VM

Recorded Webcasts

Mastering Vulnerability Management with A Risk-based Approach

To effectively prioritize and remediate the most critical vulnerabilities threatening your organization, you need to combine internal asset risk evaluation with external real-time exploit and threat intelligence to create the most accurate picture of incidence and impact.
Join this webcast to learn how Qualys and Brinqa provide all the tools you need to dramatically improve the effectiveness and performance of your vulnerability management program.

Applying Actionable Threat Intelligence to Your Vulnerability Management Program

Adding real-time threat context to your vulnerability and remediation management enables you to prioritize the most critical vulnerabilities at the right time, and reduce your exposure to threats. If you can automate this process, all the better: you're able to quickly and confidently remediate the right vulnerabilities. This live webcast will showcase how Qualys and Kenna together connect an organization’s vulnerability scanning program with actionable threat intelligence to employ a risk-based approach to vulnerability management.

Qualys Express - Part 1: Setup for Success with Vulnerability Management

In this webcast, we will go over Qualys hardware and virtual scanner appliances for internal and external vulnerability scans. We will then demonstrate how you can discover various assets in your network, prioritize them, execute vulnerability scans, and generate reports that would suit your needs.

NHS Dumfries & Galloway: Building the Business Case for Mitigating Risks

Join Gordon Wallace, Technical Manager at Qualys, and Andrew Turner, Head of Information Assurance and Security at NHS Dumfries & Galloway for this informative webcast. You’ll see how the IT department of NHS Dumfries & Galloway secures its IT systems for all medical facilities and data centres in the region—including 1,000 general practitioners and 4,500 staff.

Getting Started with Qualys Express Lite - Part 1: Vulnerability Management

In this webcast, we will go over Qualys hardware and virtual scanner appliances for internal and external vulnerability scans. We will then demonstrate how you can discover various assets in your network, prioritize them, execute vulnerability scans, and generate reports that would suit your needs.

Better Information Reveals Your High Risk Vulnerabilities

Join this webcast to learn how to get better information about the top vulnerabilities that need your attention and what to do about them. US-CERT Top 30 provides guidance that allows you to identify the most commonly exploited vulnerabilities and implement the right patches across your entire network.

Live Q&A Session: Detecting & Addressing Unsafe SSL Configurations

Following the success of our recent SSL webcast, “Detecting & Addressing Unsafe SSL Configurations”, we’re happy to announce a live follow up Q&A session with Wolfgang Kandek, CTO and Ivan Ristić, Author and Director of Application Security Research at Qualys. The webcast will begin with a recap on the current state of SSL encryption and how major problems are being addressed as covered in the initial session which can be viewed here. This will be followed by a thirty minute Q&A session where you can put any of your SSL security concerns and questions to our presenters for an expert response.

Detecting and Addressing Unsafe SSL Configurations

As a security professional, you are on constant alert for external threats. But many breaches are caused internally by incorrect configuration of IT resources, including SSL. To help improve how encryption is used, Qualys created a research project called SSL Labs to address two major problems of the ecosystem: lack of tools and documentation. Join Qualys for a webcast to hear more about the current state of SSL encryption and how major problems are being addressed.

Did you know? You can easily respond to constantly evolving Internet attacks.

With attacks on the rise and constantly changing, it’s more important than ever to respond fast. Find out how Qualys Vulnerability Management gives you a new approach to continuously secure your IT infrastructure with immediate, global visibility against evolving threats. Join this webcast to discover real-world examples of the automated solution trusted by thousands of organizations worldwide.

Did you know? More visibility of your IT assets enables better IT security.

If you could see your network assets the way hackers do, you’d know a lot more about your vulnerabilities. To secure your information systems requires control and continuous visibility of the entire network and its various components. Join this webcast to discover how Qualys ensures maximum visibility and the most accurate view of your network security.

Get Complete IT Compliance: Reduce Risk and Cost

Join Qualys and BMC to learn more about the first solution to tie vulnerability information to automated remediation actions. This dramatically reduces the window of vulnerability while simultaneously improving IT operational performance. In this webcast you will learn how you can mitigate the SecOps gap.

Top 5 Vulnerability Management Mistakes

In this webinar, you'll learn how to avoid common vulnerability management mistakes to guard your business against a successful breach and improve your overall security risk posture.

Managing Risk and Vulnerabilities in a Business Context

In this webcast, our panel of experts discuss how to shift from viewing IT risk in bits and bytes to having an impact on critical applications in the data centre.

Avoid a Breach: Using Authenticated Scanning to Uncover Hidden Security Vulnerabilities

In this webinar, join security experts Jonathan Cogley, CEO at Thycotic and Ben Yoder, Product Manager at Thycotic, Parag Baxi, Director Product Management at Qualys to learn how authenticated scanning can not only immediately increase your company's security posture by detecting deeper vulnerabilities, but also improve regulatory compliance procedures to ensure network protection against a future breach.

From Vulnerability Assessment to Vulnerability Management Using the Scan Report Template

In this webcast Nick Dlouhy, reviews how to use the Qualys scan report template

Discover your Network using Qualys Asset Tagging and Management

In this webcast learn the changes to the latest top 10 list and how to interpret difference between vulnerabilities, exploits, and weaknesses.Phil Niegos, senior technical trainer at Qualys will demonstrate how easily asset management can be setup and configured within Qualys

Strong Security Drives Compliance

In this webcast learn how aging infrastructures, ongoing cyber threats, and lack of actionable information are being solved by organizations in the energy sector.

Managing Risk and Vulnerabilities in a Business Context

In this webcast, our panel of experts discuss how to shift from viewing IT risk in bits and bytes to having an impact on critical applications in the data center.

PC

Recorded Webcasts

Overcome Outdated Processes and Automate IT Risk & Compliance

As IT, business, and regulatory environments grow increasingly complex, risk and compliance pros must move past outdated processes and legacy systems to innovate and find ways to achieve higher degrees of efficiency and oversight. Join guest speakers Nick Hayes, Analyst at Forrester, and Josh Hankins, Information Security Solutions Manager at 84.51° as they present how you can, move up the maturity curve through better program coordination and technology integration, establish the right metrics to build the business case and showcase continual progress and bolster future success by prioritising business agility and data mastery as top strategic objectives.

Best Practices for IT Configuration Compliance

Join us to learn how to reduce risk from incorrect configuration of IT resources with an easy, automated solution to maintain correct settings.

Driving Remediation of Control Deficiencies

With today’s complex and changing IT environments, driving effective remediation by prioritizing efforts where they have the most impact is a must. Learn effective methods that successful organizations use to get the most impact from their remediation efforts.

Building an Automated Compliance Program

If you’re looking to reduce the effort, time and cost of assessing systems throughout your network to maintain compliance and increase security, you won’t want to miss this informative webcast. Learn a straight-forward way to build an automated compliance program at your organization by following key best practices and critical tasks for setting up and automating your control assessment program.

Importance of Automated Controls Assessment

With multiple mandates, constantly changing IT environments and a vast and evolving threat landscape—maintaining compliance requires measurable and enforceable controls. Now you can reduce risk and continuously comply with internal policies and external regulations.

Automating Secure Configuration Assessment Best Practices

In this webcast we discuss how effective configuration control are implemented to minimise security risks associated with poor configuration settings, how SaaS-based automation is a key success factor in applying performance, and we will have a quick demonstration of Qualys policy compliance.

SAQ

Recorded Webcasts

Excel at Your Security Assessments Without EXCEL Spreadsheets

Join this webcast to learn how you can streamline your vendor and IT risk audits with a centralized solution. Traditionally security assessment surveys are implemented via email and using Excel spreadsheets. This is a manual, time-consuming method that invites errors and omissions. Qualys Security Assessment Questionnaire (SAQ) allows you to manage the assessment processes effectively, by automating these surveys to ensure the process is agile, accurate, comprehensive, centralized, scalable and uniform.

PCI

Recorded Webcasts

Best Practices for PCI Compliance

Join Qualys for a webcast to hear more about some practical steps to steer your company into compliance and create a solid defense against the latest threats to cardholder data.

PCI DSS v3: Scanning and Penetration Testing Implications

Join John Hetherton (QSA) of Espion and Gordon Caulfield (SME) of Qualys as they discuss the key changes in PCI DSS Version 3.0, examine penetration testing methodology from the auditor's point of view, and how you can maintain compliance.

Back to the Basics - PCI Validation

In this webcast, our panel of experts discuss the importance of consistent, program-level testing on your PCI environment

WAS

Upcoming Webcasts

Aligning Web Application Security with DevOps and IoT Trends

As the proliferation of IoT devices complicates the web app security landscape, security teams must engage with key app development counterparts to better secure apps across new types of devices, without slowing rapid DevOps methods or adding InfoSec strain. During this webcast, guest speakers Amy DeMartine from Forrester, and Jason Kent from Qualys will discuss how to secure apps at the speed of DevOps, utilise web security and infrastructure security assessment practices in the age of IoT, and mitigate the risk presented by the new IoT attack surface.

Recorded Webcasts

Securing Your Web Apps in Today's Complex Cloud Environment

Securing web applications has become more complex as organizations increasingly deploy and manage their web applications in the cloud. During this webcast Alex Jones from Gainsight and Dave Ferguson from Qualys will discuss how Qualys has helped Gainsight to, scan, discover, catalog applications on multiple cloud environments for vulnerabilities and website misconfigurations, adapt to increasingly complex and new web application technologies and build an easy-to-use, accurate and scalable scanning program across web application and network infrastructure.

Addressing Web Application Vulnerability with Integrated, Continuous Protection

In 2015 Gartner Magic Quadrant for Application Security Testing, Qualys was positioned highest in the "Ability to Execute" within the "Challengers" quadrant. Introducing virtual patching in the recent release of Qualys Web Application Firewall, Qualys now brings an end-to-end solution to web application security, delivering an integrated web application scanning and firewall that discovers, catalogs and protects all of your web applications wherever they reside — on premise or in the cloud. Find out how Qualys can help you implement web application security throughout your systems development lifecycle (SDLC).

Qualys Express - Part 3: How to Catalog and Scan All of Your Web Apps for Vulnerabilities

In this webcast, we will look into some easy steps you could take to run vulnerability scans against web applications. We will show you step-by-step how to configure Qualys Web Application Scanning, execute discovery and vulnerability scans, as well as run reports and create a strategy for remediation.

Getting Started with Qualys Express Lite - Part 2: Web Application Scanning

In this webcast, we will look into some easy steps you could take to run vulnerability scans against web applications. We will show you step-by-step how to configure Qualys Web Application Scanning, execute discovery and vulnerability scans, as well as run reports and create a strategy for remediation.

Preventing Web App Attacks with Progressive Scanning

Join us to learn how Qualys WAS 4.0 with Progressive Scanning provides organizations like ThousandEyes with powerful new capabilities to enhance testing coverage and provide flexible scan scheduling, reducing the burden on understaffed IT security teams.

Maximizing Coverage with Progressive Scanning

While automated web application scanning provides organizations with the most cost effective way to identify security vulnerabilities such as the OWASP top 10, most web application scanners scan the same functionality — even if you run multiple scans. Join us for this webcast to learn how progressive scanning highlights the importance of coverage of application functionality and increases safety.

How to Prevent the Next Shellshock

Between the recent Shellshock vulnerability and the web CGI based attack vectors, attackers are always finding new ways to take control of vulnerable web servers. Join us for this webinar for a review of how a Web Application Firewall can protect you.

Revealing Web Application Vulnerabilities

Vulnerabilities like Shellshock can expose unauthenticated attack vectors and increase risk to your organization—especially if you can’t fully assess your web applications. In this webcast, learn how to increase security with an automated process for testing web applications for vulnerabilities.

Web Application Threats and Trends

This webcast we review recently published web application threat intelligence from IBM, Verizon and Symantec to provide a current view of the web application threat landscape. The changing methods and motives of attackers will be reviewed as will the best practice methods for detecting and defending against the risks these threats represent.


  • Find out how web application attacker's methods and motives are changing from recently published threat intelligence.
  • Gain insight into the trends that are exposed by breach investigations.
  • Learn how to detect and defend against the most common and risky web application attacks.
Reviewing the Latest OWASP Top 10

In this webcast learn the changes to the latest top 10 list and how to interpret difference between vulnerabilities, exploits, and weaknesses.

CA

Recorded Webcasts

Vulnerability Detection in Today's Mobile Workforce

Getting to know your current vulnerability data from your mobile workforce is a difficult task. If the mobile devices are not on the network at the time of your scan your data could become out of date by weeks or even months. Join this webcast to discover how Synovus Bank use Qualys Cloud Agent to perform frequent vulnerability scans for all internal and external assets, receive faster notification and remediation for zero day and critical threats and improve their vulnerability analysis and security patching programs by providing data that can be used to prioritize patch distribution.

Detect all your IT Assets in SECONDS

A huge hurdle to protect your network is knowing exactly what devices are connected. This information is vital for quickly finding and fixing vulnerabilities. Join this webcast to discover how to run instant queries that return results in seconds, search for OS and App configuration information on all your assets for fast, accurate and actionable data and get a unified view of your IT and Security data.

A New Level of Visibility And Certainty for Security Professionals

Do you want to be able to answer questions like these quickly and with confidence?

  • Which of your vulnerabilities are actively being exploited?
  • What unauthorized software is installed on your assets?
  • Join this webcast to discover how you can get a new level of visibility and certainty using a free asset inventory product from Qualys.

Visibility and Actionable Data Across Millions of IT Assets in Seconds

Knowing what IT assets you have and how to protect them is increasingly a challenge as globalization, virtualization and mobile assets create new endpoints and new opportunities for hackers to infiltrate. Now you can move beyond traditional scanner-based approaches to strengthen endpoint security with a free solution from Qualys. Discover how Qualys AssetView gives you a fast, actionable view of all IT assets while helping to maintain security and compliance organization-wide.

Next-Gen Vulnerability Management with Cloud Agent

As global networks evolve, traditional assessment methods present many challenges for security teams such as scanning windows, managing credentials, and the rise of cloud environments. Learn more about the next phase of security assessment and how Qualys Cloud Agent instantly turns on full access to the power of Qualys vulnerability management and policy compliance. See how to extend the power of the Qualys Cloud Platform anywhere in the world and on any host including laptops, desktops, servers or virtual machines.

Introducing the Cloud Agent Platform

Join this webcast to find out about the Qualys Cloud Agent Platform (CAP). A revolutionary new platform that extends Qualys’ industry-leading Cloud Security and Compliance Platform with lightweight agents to continuously assess security and compliance of your global IT infrastructure and applications.

WAF

Recorded Webcasts

Addressing Web Application Vulnerability with Integrated, Continuous Protection

In 2015 Gartner Magic Quadrant for Application Security Testing, Qualys was positioned highest in the "Ability to Execute" within the "Challengers" quadrant. Introducing virtual patching in the recent release of Qualys Web Application Firewall, Qualys now brings an end-to-end solution to web application security, delivering an integrated web application scanning and firewall that discovers, catalogs and protects all of your web applications wherever they reside — on premise or in the cloud. Find out how Qualys can help you implement web application security throughout your systems development lifecycle (SDLC).

Web Application Security Trends and Solutions

Qualys and a guest from Forrester Research discuss in details the driving factors behind the increasing demand for web application security, trends in web application security, and key elements to implement best-in-class web application security programs.

Virtual Patching: End-to-End Web Application Security Cloud Service

Find out how the new release of Qualys WAF 2.0 provides an end-to-end solution that combines web application scanning and web application firewall to effectively detect and mitigate vulnerabilities.

Email or call us at +1 800 745 4355 or try our Global Contacts
Subscription Packages
Qualys Solutions
Qualys Community
Company
Free Trial & Tools
Popular Topics