Learn how to build configuration assessment into your overall Security & Vulnerability Risk Management Program. This presentation will showcase how Qualys Security Configuration Assessment (SCA) helps expand your current Vulnerability management program by automating the configuration assessment and reporting of varied IT assets in a continuous manner. We'll showcase out-of-the-box tools for Center for Internet Security (CIS) policies that feature a simple Web-based UI to customize the policies per your organization, collect data in agent-based and agent-less manner and leverage Qualys' leading coverage across CIS benchmarks for technologies such as operating systems, databases, applications and network devices.
Qualys at RSA Conference 2018
Speaker: Tim White, Director of Product Management, Qualys