SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
Corey	
  Bodzin	
  
VP	
  of	
  Product	
  Management	
  -­‐	
  	
  Network	
  Threat	
  Intelligence	
  
QualysGuard	
  Con2nuous	
  Monitoring	
  
The	
  QualysGuard	
  Pla>orm	
  
2	
  
*In Beta
Vulnerability
Management
Policy
Compliance
Customizable
Questionnaires
PCI
DSS
Web Application
Scanning
Malware
Detection
Web Application
Firewall
Web Application
Log Analysis
Continuous
Monitoring
*	
   *	
  *	
  
Asset
Management
VMVMAMAMCMCM PCIPCI PCPC QSQS MDSMDS LMLMWASWAS WAFWAF
* *
Rapid	
  EvoluEon	
  of	
  Corporate	
  Networks	
  
and	
  of	
  the	
  Threat	
  Landscape	
  
Our	
  Challenge…	
  
	
  
Build	
  Security	
  
Into	
  this	
  	
  
New	
  Infrastructure	
  	
  	
  	
  	
  
and	
  Make	
  
it	
  Invisible	
  
Corporate
Networks
Private Clouds
Internet
SaaS
PaaS/IaaS
Attack
Kits
Targeted
Attacks Social
Networking
Zero Days
Mobile
Threats
Phishing
QualysGuard
Changes	
  ResulEng	
  from	
  this	
  EvoluEon	
  
Your	
  perimeter	
  is	
  your	
  business	
  
Walmart	
  UK	
  eCommerce	
  Grew	
  18%	
  in	
  20131	
  
Global	
  eCommerce	
  grew	
  from	
  $10B	
  to	
  $13B	
  in	
  2013	
  
The	
  Internet	
  is	
  a	
  dangerous	
  place	
  to	
  do	
  business	
  
$11.5M	
  avg.	
  annualized	
  organizaEonal	
  cost,	
  up	
  26%	
  from	
  20122	
  
£27B	
  annual	
  cost	
  to	
  the	
  UK	
  economy	
  in	
  2011	
  
BeAer	
  monitoring	
  reduces	
  the	
  risk	
  and	
  cost	
  
OrganizaEons	
  efficient	
  at	
  detecEon	
  saved	
  nearly	
  $4	
  million	
  per	
  year3	
  
4	
  
1	
  –	
  internetRetailer,	
  	
  2	
  –	
  InfoSec	
  InsEtute,	
  	
  3	
  –	
  Ponemon	
  InsEtute	
  
What	
  is	
  Needed	
  to	
  Drive	
  Security?	
  
5	
  
Your	
  security	
  team	
  should	
  have	
  tools	
  
at	
  least	
  as	
  good	
  as	
  your	
  aAackers.	
  
	
  
Con2nuous	
  Assessment	
  
Comprehensive	
  Analysis	
  
Timely	
  Ac2on	
  
	
  
TradiEonal	
  Approach	
  ..	
  
§  Periodic	
  Scanning

§  Review	
  and	
  act	
  based	
  on	
  staEc	
  reports	
  
§  Sort/prioriEze	
  through	
  heaps	
  of	
  data	
  
	
  
Then	
  wait	
  unEl	
  the	
  next	
  Eme	
  you	
  scan	
  and	
  repeat	
  the	
  enEre	
  
process	
  again	
  and	
  again	
  –	
  simply	
  doesn’t	
  Scale	
  	
  
	
  
Leaving	
  plenty	
  of	
  Eme	
  for	
  hackers	
  ...	
  
	
  	
  
1.	
  Scan 2.	
  Report
3.	
  Repeat
7	
  
1+	
  Billion	
  Scans	
  Per	
  
Year	
  
Installed	
  
Sohware	
  
VulnerabiliEes	
  
Open	
  Ports	
  
SSL	
  CerEficates	
  
far	
  more	
  than	
  just	
  
vulnerability	
  data.	
  
Web	
  App	
  Bugs	
  
Malware	
  
Compliance	
  and	
  
ConfiguraEon	
  
Web	
  ApplicaEon	
  
Firewall	
  Events	
  
Qualys	
  ConEnuous	
  Perimeter	
  Monitoring	
  
8	
  
How	
  ConEnuous	
  Monitoring	
  Works	
  
Leverage	
  Exis2ng	
  Scans	
  
Nothing	
  new	
  required	
  –	
  just	
  scan	
  as	
  normal	
  
Leverage	
  Qualys’	
  global	
  cloud	
  infrastructure	
  scale	
  as	
  needed	
  
Define	
  Your	
  Needs	
  
Whitelists	
  and	
  blacklists	
  of	
  ports,	
  OSes,	
  cerEficate	
  providers,	
  etc.	
  
Important	
  changes	
  –	
  new	
  hosts	
  added,	
  cerEficates	
  nearing	
  expiraEon,	
  etc.	
  
Inform	
  Via	
  Alerts	
  
Distribute	
  email	
  alerts	
  to	
  any	
  users	
  or	
  systems	
  that	
  need	
  to	
  know	
  
Alerts	
  sent	
  as	
  ohen	
  as	
  every	
  5	
  minutes	
  or	
  grouped	
  every	
  day/week	
  
9	
  
Configure	
  Assets	
  to	
  Monitor	
  
10	
  
Determine	
  Baselines	
  and	
  ViolaEons	
  
11	
  
Alert	
  Analysts,	
  Admins,	
  and	
  Stakeholders	
  
12	
  
ConEnuously	
  Monitor	
  AcEvity	
  
13	
  
Why	
  is	
  ConEnuous	
  Monitoring	
  Unique?	
  
Truly	
  Con2nuous	
  Monitoring	
  
Scan	
  as	
  ohen	
  as	
  needed	
  with	
  only	
  a	
  browser	
  required	
  
No	
  addiEonal	
  costs	
  for	
  taps,	
  span	
  ports,	
  or	
  addiEonal	
  infrastructure	
  
Automated	
  Analysis	
  
Define	
  how	
  your	
  business	
  works;	
  the	
  system	
  with	
  then	
  find	
  vulnerabiliEes,	
  
misconfiguraEons,	
  and	
  process	
  problems	
  automaEcally.	
  
Alerts	
  Drive	
  Ac2on	
  
Timely	
  and	
  targeted	
  alerts	
  to	
  ensure	
  you’re	
  informed	
  and	
  protected	
  
14	
  
What	
  Makes	
  Qualys	
  Unique	
  
15	
  
Cloud	
  Based	
  Architecture	
  
Easy	
  to	
  Use	
  –	
  Easy	
  to	
  Deploy	
  
High	
  Accuracy	
  –	
  No	
  Hidden	
  Costs	
  
Large	
  and	
  Growing	
  Community	
  
New	
  Services	
  in	
  the	
  Making	
  	
  
	
  
A	
  highly	
  scalable	
  Pla>orm	
  that	
  allows	
  Qualys	
  to	
  maintain	
  
significant	
  investments	
  in	
  infrastructure	
  and	
  engineering,	
  
delivering	
  lower	
  TCO	
  and	
  the	
  best	
  customer	
  sa2sfac2on	
  
 
cbodzin@qualys.com
Thank	
  You	
  

Más contenido relacionado

La actualidad más candente

F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introduction
Jimmy Saigon
 

La actualidad más candente (20)

Web Application Firewall (WAF) DAST/SAST combination
Web Application Firewall (WAF) DAST/SAST combinationWeb Application Firewall (WAF) DAST/SAST combination
Web Application Firewall (WAF) DAST/SAST combination
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešení
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Client Security - Best security for business workstations
Client Security - Best security for business workstationsClient Security - Best security for business workstations
Client Security - Best security for business workstations
 
eSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform SimplifiedeSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform Simplified
 
Protect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileProtect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast Mobile
 
Internet gatekeeper
Internet gatekeeperInternet gatekeeper
Internet gatekeeper
 
CMTPS (Cloud-base Multi-engine Threat Prevention System)
CMTPS (Cloud-base Multi-engine Threat Prevention System)CMTPS (Cloud-base Multi-engine Threat Prevention System)
CMTPS (Cloud-base Multi-engine Threat Prevention System)
 
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS ProtectionRadware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
 
Forti web
Forti webForti web
Forti web
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
 
Advanced Threat Protection
Advanced Threat ProtectionAdvanced Threat Protection
Advanced Threat Protection
 
ATP
ATPATP
ATP
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introduction
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?
 
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoS
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoSDSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoS
DSS ITSEC 2013 Conference 07.11.2013 -Radware - Protection against DDoS
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
 
Psb mobile security
Psb mobile securityPsb mobile security
Psb mobile security
 

Destacado (6)

Představení nástroje Nuix
Představení nástroje NuixPředstavení nástroje Nuix
Představení nástroje Nuix
 
Použití hashsetů v EnCase Forensic v7
Použití hashsetů v EnCase Forensic v7Použití hashsetů v EnCase Forensic v7
Použití hashsetů v EnCase Forensic v7
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Information Secuirty Vulnerability Management
Information Secuirty   Vulnerability ManagementInformation Secuirty   Vulnerability Management
Information Secuirty Vulnerability Management
 
QualysGuard InfoDay 2013 - QualysGuard RoadMap for H2-­2013/H1-­2014
QualysGuard InfoDay 2013 - QualysGuard RoadMap for H2-­2013/H1-­2014QualysGuard InfoDay 2013 - QualysGuard RoadMap for H2-­2013/H1-­2014
QualysGuard InfoDay 2013 - QualysGuard RoadMap for H2-­2013/H1-­2014
 
MISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM ImplementationMISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM Implementation
 

Similar a QualysGuard InfoDay 2014 - QualysGuard Continuous Monitoring

Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance
Amazon Web Services
 
inSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdfinSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdf
ChristopherSumner7
 
Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paper
Tawnia Beckwith
 

Similar a QualysGuard InfoDay 2014 - QualysGuard Continuous Monitoring (20)

Splunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat DefenseSplunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat Defense
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance
 
inSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdfinSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdf
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
What's Wrong with Vulnerability Management & How Can We Fix It
What's Wrong with Vulnerability Management & How Can We Fix ItWhat's Wrong with Vulnerability Management & How Can We Fix It
What's Wrong with Vulnerability Management & How Can We Fix It
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud Journey
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
 
VMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptxVMware-vShield-Presentation-pp-en-Dec10.pptx
VMware-vShield-Presentation-pp-en-Dec10.pptx
 
Convince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureConvince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cure
 
Globally.docx
Globally.docxGlobally.docx
Globally.docx
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 
Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paper
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security Deployment
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Plataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaPlataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação Cibernética
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar
 

Más de Risk Analysis Consultants, s.r.o.

QualysGuard InfoDay 2014 - QualysGuard Web Application Security a Web Applica...
QualysGuard InfoDay 2014 - QualysGuard Web Application Security a Web Applica...QualysGuard InfoDay 2014 - QualysGuard Web Application Security a Web Applica...
QualysGuard InfoDay 2014 - QualysGuard Web Application Security a Web Applica...
Risk Analysis Consultants, s.r.o.
 
QualysGuard InfoDay 2013 - Případová studie ČNB - QG WAS
QualysGuard InfoDay 2013 - Případová studie ČNB - QG WASQualysGuard InfoDay 2013 - Případová studie ČNB - QG WAS
QualysGuard InfoDay 2013 - Případová studie ČNB - QG WAS
Risk Analysis Consultants, s.r.o.
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
Risk Analysis Consultants, s.r.o.
 

Más de Risk Analysis Consultants, s.r.o. (20)

Best practice v testování zranitelností
Best practice v testování zranitelnostíBest practice v testování zranitelností
Best practice v testování zranitelností
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
FTK5 - HW požadavky a instalace
FTK5 - HW požadavky a instalaceFTK5 - HW požadavky a instalace
FTK5 - HW požadavky a instalace
 
Použití EnCase EnScript
Použití EnCase EnScriptPoužití EnCase EnScript
Použití EnCase EnScript
 
RAC DEAS - Univerzální SW nástroj k zajištění digitálních stop
RAC DEAS - Univerzální SW nástroj k zajištění digitálních stopRAC DEAS - Univerzální SW nástroj k zajištění digitálních stop
RAC DEAS - Univerzální SW nástroj k zajištění digitálních stop
 
RAC DEAT - Univerální HW nástroje pro zajištění digitálních stop
RAC DEAT - Univerální HW nástroje pro zajištění digitálních stopRAC DEAT - Univerální HW nástroje pro zajištění digitálních stop
RAC DEAT - Univerální HW nástroje pro zajištění digitálních stop
 
QualysGuard InfoDay 2014 - QualysGuard Web Application Security a Web Applica...
QualysGuard InfoDay 2014 - QualysGuard Web Application Security a Web Applica...QualysGuard InfoDay 2014 - QualysGuard Web Application Security a Web Applica...
QualysGuard InfoDay 2014 - QualysGuard Web Application Security a Web Applica...
 
QualysGuard InfoDay 2014 - Asset management
QualysGuard InfoDay 2014  - Asset managementQualysGuard InfoDay 2014  - Asset management
QualysGuard InfoDay 2014 - Asset management
 
QualysGuard InfoDay 2014 - WAS
QualysGuard InfoDay 2014 - WASQualysGuard InfoDay 2014 - WAS
QualysGuard InfoDay 2014 - WAS
 
QualysGuard InfoDay 2014 - Policy compliance
QualysGuard InfoDay 2014 - Policy complianceQualysGuard InfoDay 2014 - Policy compliance
QualysGuard InfoDay 2014 - Policy compliance
 
QualysGuard InfoDay 2014 - Vulnerability management
QualysGuard InfoDay 2014 - Vulnerability managementQualysGuard InfoDay 2014 - Vulnerability management
QualysGuard InfoDay 2014 - Vulnerability management
 
Analýza elektronické pošty v EnCase Forensic v7
Analýza elektronické pošty v EnCase Forensic v7Analýza elektronické pošty v EnCase Forensic v7
Analýza elektronické pošty v EnCase Forensic v7
 
Vybrané funkce Forensic Toolkit 5 + RAC Forensic Imager
Vybrané funkce Forensic Toolkit 5 + RAC Forensic ImagerVybrané funkce Forensic Toolkit 5 + RAC Forensic Imager
Vybrané funkce Forensic Toolkit 5 + RAC Forensic Imager
 
QualysGuard InfoDay 2013 - Případová studie ČNB - QG WAS
QualysGuard InfoDay 2013 - Případová studie ČNB - QG WASQualysGuard InfoDay 2013 - Případová studie ČNB - QG WAS
QualysGuard InfoDay 2013 - Případová studie ČNB - QG WAS
 
QualysGuard InfoDay 2013 - Qualys Questionnaire
QualysGuard InfoDay 2013 - Qualys QuestionnaireQualysGuard InfoDay 2013 - Qualys Questionnaire
QualysGuard InfoDay 2013 - Qualys Questionnaire
 
QualysGuard InfoDay 2013 - Nové funkce QG
QualysGuard InfoDay 2013 - Nové funkce QGQualysGuard InfoDay 2013 - Nové funkce QG
QualysGuard InfoDay 2013 - Nové funkce QG
 
QualysGuard InfoDay 2013 - Web Application Firewall
QualysGuard InfoDay 2013 - Web Application FirewallQualysGuard InfoDay 2013 - Web Application Firewall
QualysGuard InfoDay 2013 - Web Application Firewall
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
 
QualysGuard InfoDay 2013 - Asset Management
QualysGuard InfoDay 2013 - Asset ManagementQualysGuard InfoDay 2013 - Asset Management
QualysGuard InfoDay 2013 - Asset Management
 
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for QualysQualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
 

Último

Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
sexy call girls service in goa
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Sheetaleventcompany
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
shivangimorya083
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 

Último (20)

VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 

QualysGuard InfoDay 2014 - QualysGuard Continuous Monitoring

  • 1. Corey  Bodzin   VP  of  Product  Management  -­‐    Network  Threat  Intelligence   QualysGuard  Con2nuous  Monitoring  
  • 2. The  QualysGuard  Pla>orm   2   *In Beta Vulnerability Management Policy Compliance Customizable Questionnaires PCI DSS Web Application Scanning Malware Detection Web Application Firewall Web Application Log Analysis Continuous Monitoring *   *  *   Asset Management VMVMAMAMCMCM PCIPCI PCPC QSQS MDSMDS LMLMWASWAS WAFWAF * *
  • 3. Rapid  EvoluEon  of  Corporate  Networks   and  of  the  Threat  Landscape   Our  Challenge…     Build  Security   Into  this     New  Infrastructure           and  Make   it  Invisible   Corporate Networks Private Clouds Internet SaaS PaaS/IaaS Attack Kits Targeted Attacks Social Networking Zero Days Mobile Threats Phishing QualysGuard
  • 4. Changes  ResulEng  from  this  EvoluEon   Your  perimeter  is  your  business   Walmart  UK  eCommerce  Grew  18%  in  20131   Global  eCommerce  grew  from  $10B  to  $13B  in  2013   The  Internet  is  a  dangerous  place  to  do  business   $11.5M  avg.  annualized  organizaEonal  cost,  up  26%  from  20122   £27B  annual  cost  to  the  UK  economy  in  2011   BeAer  monitoring  reduces  the  risk  and  cost   OrganizaEons  efficient  at  detecEon  saved  nearly  $4  million  per  year3   4   1  –  internetRetailer,    2  –  InfoSec  InsEtute,    3  –  Ponemon  InsEtute  
  • 5. What  is  Needed  to  Drive  Security?   5   Your  security  team  should  have  tools   at  least  as  good  as  your  aAackers.     Con2nuous  Assessment   Comprehensive  Analysis   Timely  Ac2on    
  • 6. TradiEonal  Approach  ..   §  Periodic  Scanning §  Review  and  act  based  on  staEc  reports   §  Sort/prioriEze  through  heaps  of  data     Then  wait  unEl  the  next  Eme  you  scan  and  repeat  the  enEre   process  again  and  again  –  simply  doesn’t  Scale       Leaving  plenty  of  Eme  for  hackers  ...       1.  Scan 2.  Report 3.  Repeat
  • 7. 7   1+  Billion  Scans  Per   Year   Installed   Sohware   VulnerabiliEes   Open  Ports   SSL  CerEficates   far  more  than  just   vulnerability  data.   Web  App  Bugs   Malware   Compliance  and   ConfiguraEon   Web  ApplicaEon   Firewall  Events  
  • 8. Qualys  ConEnuous  Perimeter  Monitoring   8  
  • 9. How  ConEnuous  Monitoring  Works   Leverage  Exis2ng  Scans   Nothing  new  required  –  just  scan  as  normal   Leverage  Qualys’  global  cloud  infrastructure  scale  as  needed   Define  Your  Needs   Whitelists  and  blacklists  of  ports,  OSes,  cerEficate  providers,  etc.   Important  changes  –  new  hosts  added,  cerEficates  nearing  expiraEon,  etc.   Inform  Via  Alerts   Distribute  email  alerts  to  any  users  or  systems  that  need  to  know   Alerts  sent  as  ohen  as  every  5  minutes  or  grouped  every  day/week   9  
  • 10. Configure  Assets  to  Monitor   10  
  • 11. Determine  Baselines  and  ViolaEons   11  
  • 12. Alert  Analysts,  Admins,  and  Stakeholders   12  
  • 14. Why  is  ConEnuous  Monitoring  Unique?   Truly  Con2nuous  Monitoring   Scan  as  ohen  as  needed  with  only  a  browser  required   No  addiEonal  costs  for  taps,  span  ports,  or  addiEonal  infrastructure   Automated  Analysis   Define  how  your  business  works;  the  system  with  then  find  vulnerabiliEes,   misconfiguraEons,  and  process  problems  automaEcally.   Alerts  Drive  Ac2on   Timely  and  targeted  alerts  to  ensure  you’re  informed  and  protected   14  
  • 15. What  Makes  Qualys  Unique   15   Cloud  Based  Architecture   Easy  to  Use  –  Easy  to  Deploy   High  Accuracy  –  No  Hidden  Costs   Large  and  Growing  Community   New  Services  in  the  Making       A  highly  scalable  Pla>orm  that  allows  Qualys  to  maintain   significant  investments  in  infrastructure  and  engineering,   delivering  lower  TCO  and  the  best  customer  sa2sfac2on