Qualys, Inc. is the leading provider of on demand IT security risk and compliance management solutions - delivered as a service. Qualys' Software-as-a-Service solutions are deployed in a matter of hours anywhere in the world, providing customers an immediate and continuous view of their security and compliance postures. The QualysGuard(r) service is used today by more than 3,500 organizations in 85 countries, including 35 of the Fortune Global 100 and performs more than 200 millions IP audits per year. For more information, please visit

Our Website:

Whitepaper: 7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction

by QualysNov 20, 2009

Whether you're protecting 5 servers or 5,000, this paper details the essential aspects of putting into place a measurable and sustainable vulnerability management program.

Whitepaper: Vulnerability Management Buyer's Checklist

by QualysNov 20, 2009

Get this 12-point Checklist of key considerations every IT security professional needs to be aware of before choosing a vulnerability management solution.

Whitepaper: Case Study: eBay, Inc. - Securing the World's Online Marketplace

by QualysNov 20, 2009

Learn how eBay was able to automate their network security auditing and get meaningful, actionable reports

Whitepaper: Vulnerability Management for Dummies

by QualysMay 01, 2008

As a business owner, or someone responsible for network security within your organization, you need to understand how to prevent attacks and eliminate network weaknesses that leave your business exposed and at risk.

"Vulnerability Management for Dummies" arms you with the facts and shows you how to implement a successful Vulnerability Management program. Whether your network consists of just a handful of computers or thousands of servers distributed around the world, this book will help:

- Explain the critical need for Vulnerability Management (VM)
- Detail the essential best-practice steps of a successful VM Program
- Outline the various VM Solutions - including the pros & cons of each
- Highlight the award-winning QualysGuard VM solution
- Provide a 10-point checklist for removing vulnerabilities from your key resources