1. Demonstration of best practices for responding to a suspicious device identified by Qualys Indication of Compromise.

    # vimeo.com/354052856 Uploaded 123 Views 0 Comments
  2. How you can get proactive in reducing attack surfaces around endpoint detection and threat hunting. Includes demo of Qualys Indication of Compromise.

    # vimeo.com/353897342 Uploaded 64 Views 0 Comments
  3. This talk demonstrates how threat actors are rapidly weaponizing known vulnerabilities to target, exploit, and take over organization’s network for financial motivations, customer account and intellectual property theft, and sabotage. Learn how to using Qualys Indication of Compromise and other Cloud Apps to address mutant, dormant, and fileless malware; and best practices for streamlining Threat Hunting and Incident Response by instantly identifying compromised and suspicious devices across endpoints and networks.

    Chris Carlson, VP of Product Management, Qualys

    # vimeo.com/301686551 Uploaded 169 Views 0 Comments
  4. The most scalable way to prevent breaches of endpoints, servers, and cloud workloads is to reduce the attack surface of the asset itself. Operational vulnerability management, remediation prioritization, transparent patching, secure configuration assessment, real-time activity monitoring, and active threat hunting delivered by a unified security platform can significantly reduce the likelihood of breaches by focusing on reducing the attack surface of enterprise IT environments. In this session, learn how to identify, remediate, detect, and respond to common and targeted attacks that can evade traditional and next-gen prevention technologies.

    Qualys Talk at Microsoft Ignite Booth 1737 - September 24-28, 2018

    Endpoint Breach Prevention by Reducing Attack Surfaces
    Brett Price, Regional Vice President, Qualys

    # vimeo.com/293054276 Uploaded 76 Views 0 Comments
  5. Learn how to perform threat hunting and detect compromised assets with Qualys Indication of Compromise.

    # vimeo.com/289582255 Uploaded 339 Views 0 Comments

Indication of Compromise

Qualys, Inc. Business

Learn how to use Qualys threat hunting, suspicious activity monitoring, and malware family detection.

Browse This Channel

Channels are a simple, beautiful way to showcase and watch videos. Browse more Channels.