Setup for Success with Qualys Express Part 2: Continuous Monitoring

Logo
Presented by

Calvin Lam, Technical Account Manager, Qualys

About this talk

In this webcast, we will cover a few steps you could take to identify and filter on key events and/or vulnerabilities and quickly alert the proper staff to take action before the attackers do. We will show you how to deploy rules (whitelists and blacklists), set the system to detect important changes (new hosts, nearly expired certificates, etc), as well as deliver alerts to any users or systems that need to know.
Related topics:

More from this channel

Upcoming talks (5)
On-demand talks (140)
Subscribers (76168)
Join us for this informative technology series for insights into emerging security trends that every IT professional should know. These brief sessions will give you an opportunity to discover best practices from market leaders as well as hands-on advice from industry experts on a variety of security and compliance topics. Let Qualys help keep you up-to-date with cost-effective and efficient technology trends. Choose the topic that interests you or plan to attend the entire series to make sure you stay ahead of the curve.