Information Security Research Library

Powered by Bitpipe.com

All Research Sponsored By:Qualys

  • Discovering Vulnerable Web Applications

    This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.

  • Best Practices for Cloud Security

    In this essential white paper, discover the benefits that your organization can realize by embracing cloud services, including more effective and cost-efficient security. Also inside, discover cloud cautions and pitfalls to avoid – read on now to learn more.

  • The Urgent Need to rethink Security Using the Cloud

    This informative resource describes the many benefits that accompany the shift to a cloud-based security strategy. Discover how you can simplify, centralize, and enhance everything from endpoint security to compliance. Reduce web app vulnerabilities and manage threats with ease -- read on to learn more.

  • The Top 10 Reports for Managing Vulnerabilities

    Observing the complete lifecycle of vulnerability management begins with asset discovery. Learn more about the key steps for successful management with this informative resource. How can you improve your security?

  • Web Application Security: How to Minimize the Risk of Attacks

    This informative white paper outlines the importance of Web application security. With over 55 percent of vulnerabilities in 2010 resulting in attacks, a solution is necessary. Learn more about the different types of Web application vulnerabilities as well as how to detect vulnerabilities more efficiently.

  • Nine Steps to Smart Security for Small Businesses

    This guide uncovers nine simple steps for implementing smart security for your business. View now to explore why firewalls and anti-virus are not enough, and how to reduce risk while cutting costs.

  • Winning the PCI Compliance Battle

    This resource offers a guide for merchants and member services providers for meeting the requirements PCI DSS.

  • Web Application Security — How to Minimize Prevalent Risk of Attacks

    This guide surveys typical web application vulnerabilities, compares options for detection, and introduces the QualysGuard Web Application Scanning solution – a new on demand service from Qualys that automates detection of the most prevalent vulnerabilities in custom web applications.

  • Winning the PCI Compliance Battle: A Guide for Merchants and Member Service Providers

    The PCI Data Security Standard requirements apply to all payment card network members, merchants and service providers that store, process or transmit cardholder data. This guide will outline the six core requirement categories, participation and validation requirements, how to select a PCI networking testing service and more.

  • The Big Shift to Cloud-based Security

    Access this white paper to learn how small and medium-sized organizations can manage their IT risks and maintain regulatory compliance with minimal staff and budget, using cloud-based security.

  • Case Study: WebEx - Securing Web Collaboration

    Read this case study to learn about the vulnerability and compliance risk management program WebEx has implemented to ensure security and confidentiality among their customers.

  • IT Policy Compliance for Dummies®

    This book simply explains IT policy compliance and the steps your organisation needs to carry out to prove compliance to an independent auditor. After reading this book you'll know how to create compliance policies and prepare your IT operations to fulfill those requirements.

  • Web Application Security - How to Minimise Prevalent Risk of Attacks

    Read this white paper to understand how to minimise vulnerabilities in web applications. A guide to web application security outlines typical web application vulnerabilities and provides a comparison of web application vulnerability detection options.

  • Guide to Effective Remediation of Network Vulnerabilities and Policy Compliance

    This guide describes the major workflow processes of vulnerability management and how QualysGuard, as an on demand software-as-a-service automates most of these for fast, cost-effective remediation and compliance documentation.

  • 7 Essential Steps of Network Security

    This paper details the essential aspects of putting into place a measurable and sustainable 7 step vulnerability management program, and demonstrates how QualysGuard automates everything you need along the way.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.