As a security manager, you are on constant alert for external threats. But many breaches are caused internally by incorrect configuration of IT resources. According to HP, 80 per cent of applications contain vulnerabilities caused by incorrect configuration. How do you find these and ensure that system settings stay correct? Find out how to automate the process with Qualys Policy Compliance.
Watch Qualys Policy Compliance’s webcast and slideshow to learn how you can automate IT configuration assessments for stronger security and compliance.
Speaker: Tim White, Director of Product Management for Policy Compliance, Qualys
Host: Dan Raywood, Editor, IT Security Guru
To access your free Qualys whitepaper, ‘Narrowing the security gap with automated configuration assessment’, please click on the thumbnail image to the left.
Look out for the next webinar in the series, coming soon!
For more information about Business Reporter webinars, videos or reports, please contact Sean Fox at email@example.com