Qualys

Results: 208



#Item
71Computer security / Security / Cyberwarfare / Computer network security / Qualys / Vulnerability / Attack / Asset / Threat

Solution Brief: Top 6 Security Use Cases for Automated Asset Inventory SOLUTION BRIEF TOP 6 SECURITY USE CASES

Add to Reading List

Source URL: www.qualys.com

Language: English - Date: 2016-01-15 14:54:13
72Information privacy / Payment cards / Computing / Business / Economy / Computer law / E-commerce / Payment Card Industry Data Security Standard / Peripheral Component Interconnect / Qualys / Conventional PCI / Payment card industry

PCI Compliance Getting Started Guide Qualys PCI provides businesses, merchants and online service providers with the easiest, most cost effective and highly automated way to achieve compliance with the Payment Card Indus

Add to Reading List

Source URL: www.qualys.com

Language: English - Date: 2016-03-18 15:34:30
73Computing / Markup languages / Technical communication / Qualys / Ajax / JavaScript / JSON / Application programming interface

Continuous Monitoring API User Guide January 6, 2016 Copyrightby Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks are the property of

Add to Reading List

Source URL: www.qualys.com

Language: English - Date: 2016-02-01 18:40:52
74

Qualys Free Services Platform Maintenance Notification Qualys regularly upgrades the Qualys Cloud Platforms for capacity expansion and maintenance purposes. We are implementing an upgrade that will allow Qualys to apply

Add to Reading List

Source URL: www.qualys.com

- Date: 2016-07-11 16:18:30
    75Qualys / Cloud infrastructure / Cloud computing

        Qualys  AssetView   Free  cloud-­‐based  IT  asset  inventory  service  that  scales  to  millions  of  global  assets  

    Add to Reading List

    Source URL: www.qualys.com

    Language: English - Date: 2015-09-15 16:24:42
    76Cyberwarfare / United States Department of Homeland Security / Cybercrime / Computer security / International Multilateral Partnership Against Cyber Threats / National Cyber Security Division / United States Computer Emergency Readiness Team

    CONTINUOUS DIAGNOSTICS & MITIGATION PROGRAM The growing number of cyber attacks on Federal government networks are sophisticated, aggressive, and dynamic. A recent cybersecurity report* disclosed that over 90 percent of

    Add to Reading List

    Source URL: blog.qualys.com

    Language: English - Date: 2016-01-18 23:50:24
    77

    Case Study: United Online Challenges Chose WhiteHat over: IBM Veracode Qualys

    Add to Reading List

    Source URL: www.whitehatsec.com

    Language: English - Date: 2016-06-16 12:54:09
      78

      Case Study: Linedata Challenges Chose WhiteHat over: Qualys Motivated to invest in an application security solution for the following reasons: For compliance

      Add to Reading List

      Source URL: www.whitehatsec.com

      Language: English - Date: 2016-06-16 08:28:52
        79

        SSL Server Rating Guide version 2009k (14 OctoberCopyright © Qualys SSL Labs (www.ssllabs.com) Abstract The Secure Sockets Layer (SSL) protocol is a standard for encrypted network communication. We feel

        Add to Reading List

        Source URL: dev.ssllabs.com

        Language: English - Date: 2016-04-12 09:51:38
          80Computer security / Computing / Computer forensics / Mimecast / FireEye / Kaspersky Lab / Trusteer / Qualys / Dell Software / Trend Micro / Cloud computing security / Lastline

          SCAWARDS2014_honor_Horizontal

          Add to Reading List

          Source URL: static.webvid.co.uk

          Language: English - Date: 2015-06-09 10:42:45
          UPDATE