by Mirko Zorz - Editor in Chief - Thursday, 14 August 2014.
Qualys Continuous Monitoring is a next-generation cloud service that gives you the ability to identify threats and unexpected changes in your Internet perimeter before they turn into breaches. With it, you can track what happens within Internet-facing devices throughout your DMZs and cloud environments – anywhere in the world.
In this podcast recorded at Black Hat USA 2014, Sumedh Thakar, Chief Product Officer at Qualys, talks about a new approach to vulnerability management and network security, enabling you to immediately identify and proactively address potential problems.
Continuous Monitoring gives you a hackers-eye view of your perimeter systems – from the Internet. It detects changes in your perimeter that could be exploited and immediately notifies the IT staff responsible for the affected assets so they can take appropriate action.
Press the play button below to listen to the podcast:
As Chief Product Officer at Qualys, Sumedh oversees worldwide engineering, development and product management for the QualysGuard software-as-a-service (SaaS) platform and integrated suite of security and compliance applications. A core systems and database engineer, Sumedh started at Qualys in 2003, architecting and delivering QualysGuard's PCI compliance platform to meet the PCI DSS requirements. Today, more than 69 percent of ASVs and 50 percent of QSAs worldwide use QualysGuard PCI to perform PCI DSS certification.
Posted on 19 November 2014. | Expectations for data security next year are surprisingly optimistic given the harsh reality of 2014. Enterprise security staffers are so confident that most respondents said they would "personally guarantee that their company's customer data will be safe in 2015."
Posted on 18 November 2014. | Ryan Ward, CISO at Avatier, talks about the overlooked benefits of risk assessment, offers best practices for performing successful risk assessments, outlines the pre-requisites for becoming a risk assessment professional, and more.
Posted on 17 November 2014. | Mark Gazit, the CEO of ThetaRay, talks about leveraging Big Data to secure networks, the advantages of using math-based anomaly detection as well as the evolution of threat detection in the past decade.