Automate the Assessment of Technical Controls & Mandate-based Security Requirements
With so many overlapping and vague compliance requirements, selecting appropriate technical and procedural controls continues to be a challenge for organizations of all sizes in every industry. On the other side, there's always a race to make sure our environment is free from vulnerability, configuration and overall security issues, through robust cybersecurity procedures. Learn how innovations in the compliance family of apps can help you overcome common compliance challenges, simplify the control selection process and overall continuous compliance monitoring. You will see a preview of new automation to simplify control selection & assessment, continuous visibility into mandated requirements, and find new ways to get more data into the Qualys platform for a complete view of your compliance landscape.
Learn how to build configuration assessment into your overall Security & Vulnerability Risk Management Program. This presentation will showcase how Qualys Security Configuration Assessment (SCA) helps expand your current Vulnerability management program by automating the configuration assessment and reporting of varied IT assets in a continuous manner. We'll showcase out-of-the-box tools for Center for Internet Security (CIS) policies that feature a simple Web-based UI to customize the policies per your organization, collect data in agent-based and agent-less manner and leverage Qualys' leading coverage across CIS benchmarks for technologies such as operating systems, databases, applications and network devices.
Qualys at RSA Conference 2018
Speaker: Tim White, Director of Product Management, Qualys
How Qualys Security Configuration Assessment helps organizations expand their VM programs to include assessment, reporting and remediation of security-related configuration issues using the latest out-of-the-box Center for Internet Security (CIS) benchmarks.