Qualys : Call For Customer Presentations at RSA Conference 2018!
December 13, 2017 at 04:37 pm EST
Share
Tell your security story to your peers at RSA Conference 2018 San Francisco!
Qualys is looking for customers excited to share their security and DevSecOps successes, best practices and case studies leveraging the use of the Qualys Cloud Platform. Take the stage in the Qualys booth to share your experience with RSA Conference attendees two or three times total during exhibit hall hours on April 16, 17, 18 and 19.
If you would like to be considered as a presenter, please send a title and short abstract for a 25-minute presentation to David Conner at dconner@qualys.com. The call for presenters is open through Thursday, February 15, 2018.
RSA Conference 2018 is held at Moscone Convention Center in San Francisco. Qualys will provide accepted presenters with a full conference pass, and pay your airfare plus hotel expenses for the conference.
Qualys Inc. published this content on 13 December 2017 and is solely responsible for the information contained herein. Distributed by Public, unedited and unaltered, on 13 December 2017 21:36:10 UTC.
Original documenthttps://blog.qualys.com/news/2017/12/13/call-for-customer-presentations-at-rsa-conference-2018
Public permalinkhttp://www.publicnow.com/view/C1E6B08EA8C7ACE84F0E9167E5FCC1B3EC0CB3FB
Qualys, Inc. is a provider of a cloud-based platform delivering information technology (IT), security and compliance solutions. The Companyâs integrated suite of IT, security and compliance solutions delivered on Qualys' Enterprise TruRisk Platform enables its customers to identify and manage their IT and operational technology (OT) assets, collect, and analyze large amounts of IT security data, recommend, and implement remediation actions and verify the implementation of such actions. It provides its solutions through a software-as-a-service model, primarily with renewable annual subscriptions. Its cloud platform offers an integrated suite of solutions that automates the lifecycle of asset discovery and management, security and compliance assessments, and remediation for an organizationâs IT infrastructure and assets, whether such infrastructure and assets reside inside the organization, on their network perimeter, on endpoints or in the cloud.