1. Automate the Assessment of Technical Controls & Mandate-based Security Requirements

    With so many overlapping and vague compliance requirements, selecting appropriate technical and procedural controls continues to be a challenge for organizations of all sizes in every industry. On the other side, there's always a race to make sure our environment is free from vulnerability, configuration and overall security issues, through robust cybersecurity procedures. Learn how innovations in the compliance family of apps can help you overcome common compliance challenges, simplify the control selection process and overall continuous compliance monitoring. You will see a preview of new automation to simplify control selection & assessment, continuous visibility into mandated requirements, and find new ways to get more data into the Qualys platform for a complete view of your compliance landscape.

    Tim White, Director of Product Management, Qualys

    # vimeo.com/301686498 Uploaded 126 Plays 0 Comments
  2. Learn how to build configuration assessment into your overall Security & Vulnerability Risk Management Program. This presentation will showcase how Qualys Security Configuration Assessment (SCA) helps expand your current Vulnerability management program by automating the configuration assessment and reporting of varied IT assets in a continuous manner. We'll showcase out-of-the-box tools for Center for Internet Security (CIS) policies that feature a simple Web-based UI to customize the policies per your organization, collect data in agent-based and agent-less manner and leverage Qualys' leading coverage across CIS benchmarks for technologies such as operating systems, databases, applications and network devices.

    Qualys at RSA Conference 2018
    Speaker: Tim White, Director of Product Management, Qualys

    # vimeo.com/266406998 Uploaded 100 Plays 0 Comments
  3. # vimeo.com/230223249 Uploaded 453 Plays 0 Comments
  4. How Qualys Security Configuration Assessment helps organizations expand their VM programs to include assessment, reporting and remediation of security-related configuration issues using the latest out-of-the-box Center for Internet Security (CIS) benchmarks.

    # vimeo.com/271916109 Uploaded 771 Plays 0 Comments

Security Configuration Assessment

Qualys, Inc. Business

Browse This Channel

Shout Box

Heads up: the shoutbox will be retiring soon. It’s tired of working, and can’t wait to relax. You can still send a message to the channel owner, though!

Channels are a simple, beautiful way to showcase and watch videos. Browse more Channels.