Qualys - IT security risk and compliance solutions

Qualys - IT security risk and compliance solutions White Papers


Making Your Website Safe for Online Buyers with the Qualys SECURE Seal

The number one concern of internet users is that a website will keep personal information safe and secure. Toward this end, many users look for a website to display a third party seal as evidence of security.

View white paper

Web Application Security for Dummies®

Web applications have become the Achilles heel of IT security. Web application vulnerabilities are now the most prevalent at more than 55 per cent of all server vulnerability disclosures.

View white paper

IT Policy Compliance For Dummies

This eBook explains IT policy compliance and the steps your organisation needs to carry out to prove compliance to an independent auditor. After reading this book you'll know how to create compliance policies and prepare your IT operations to fulfil those requirements.

View white paper

Justifying IT Security - Managing Risk and Keeping Your Network Secure

The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of risk and how vulnerability management is one of the few counter-measures easily justified by its ability to optimise risk.

View white paper

PCI Compliance for Dummies

Complying with the PCI Data Security Standard may seem like a daunting task for merchants. This guide explains how to protect cardholder data and comply with the requirements of PCI - from surveying the standard's requirements to detailing steps for verifying compliance.

View white paper

Responding to the New Information Risk Landscape

This paper analyses the trends and changing priorities of the emerging information security landscape, setting out a new action agenda for managing future information risks across a volatile and increasingly externalised business environment.

View white paper

The Top 10 Reports for Managing Vulnerabilities

This paper cuts through the data overload generated by some vulnerability detection solutions. It covers the key aspects of the vulnerability management lifecycle and shows you what reports today's best-in-class organisations are using to reduce risks on their network infrastructure.

View white paper

Understanding and Selecting a Database Assessment Solution

Database Assessment is not just a security precaution, but an integral part of database operations management. This whitepaper provides the information necessary to understand the value of database assessments and properly evaluates products both individually and head-to-head so you can avoid common problems that occur in assessing databases.

View white paper

Web Application Security — How to Minimise Prevalent Risk of Attacks

The guide surveys typical web application vulnerabilities, compares options for detection, and introduces the QualysGuard Web Application Scanning solution - a new on demand service from Qualys that automates detection of the most prevalent vulnerabilities in custom web applications.

View white paper

Winning the PCI Compliance Battle

This white paper reviews the basics of PCI, including who must comply, compliance requirements, validation requirements and penalties. It also examines the key things to look for when selecting a PCI network testing service and introduces QualysGuard PCI.

View white paper