fbico gpico linkedin twico logo-small logo-tall
alexa ip pinterest pr url refresh_ico link-follow link-nofollow leftmenu-content leftmenu-domain leftmenu-links leftmenu-metas leftmenu-seoaudit leftmenu-speed leftmenu-tech error good good status base_ico warning

SEO audit: www.qualys.com

qualys.com desktop náhľad obrázku
48 %

Popis značiek

V poriadku
Chyba
Návrh
Stav
Try our white label PDF! 3 days trial!

Mobilné nástroje

Chyba! Zobrazenie na mobilnom zariadení nie je optimálne: 1005px je prispôsobené veľkému zobrazeniu!
Chyba! Zobrazenie na tablete nie je optimálne: 1005px je prispôsobené veľkému zobrazeniu!
qualys.com mobil náhľad obrázku
qualys.com tablet náhľad obrázku

Náhľad vyhľadávania výsledkov v Google

Network Security and Vulnerability Management | Qualys, Inc.

www.qualys.com/
Qualys, Inc. helps your business automate the full spectrum of auditing, compliance and protection of your IT systems and web applications.

Domain / URL audit

Domain : www.qualys.com/
Dĺžka (v charakteroch) : 15
Globálne umiestnenie na Alexa: 27076
Umiestnenie na Alexa (Spojené štáty): 11594
64.39.96.133 ip adresa nie je na zozname spam
KrajinaPercento
Spojené štáty37.7%
India11.5%
Čína3.9%
Spojené kráľovstvo3.1%
Francúzsko2.3%
Kanada2.2%
Hongkong2.0%
Austrália2.0%
Turecko1.7%
Nemecko1.6%
Španielsko1.6%
Rakúsko1.2%
Japonsko1.2%
Grécko0.6%
Iné27.4%
Ukázať viac

SEO audit: Analýza obsahu

Jazyková lokalizácia bola zadaná: "en".
Network Security and Vulnerability Management | Qualys, Inc.

Dĺžka (v charakteroch) : 60

Skvelé! Dĺžka názvu stránky (title) je medzi 10 a 70 charaktermi
Pomer : 15%

Prijateľné! Pomer textu/kódov je na webovej stránke v pomere medzi 15 a 25
Chyba! Stránka používa aj flash riešenie, ktoré vedia vyhľadávacie roboty analyzovať len ťažko.
Skvelé! Webová stránka nepoužíva frame riešenie.
express  vulnerabilities  small  patch  cloud  community  management  compliance  platform  scanning  vulnerability  every  continuous  audits  perimeter  all  web  solutions  enterprise  subscription  monitoring  businesses  packages  make  download  network  application  policies  events  attackers  support  business  reports  partners  best  apps  organize  identify  app  found  pci  security  firewall  malware  risk  continuously  trial  match  resources  qualys  format  secure  global  training  more  systems  company  consultant  blogs  free 
Kľúčové slovo Obsah Názov (Title) Popis (meda description) Tituly (Headings)
qualys 35
security 21
web 15
apps 10
compliance 10
platform 9
Kľúčové slová (pozostávajúce z 2 slov) Obsah Názov (Title) Popis (meda description) Tituly (Headings)
your network 4
qualys blogs 3
your business 2
express lite 2
packages enterprise 2
qualys cloud 2
H1H2H3H4H5H6
095704
H1, H5 chýba

Štruktúra heading v zdrojových kódoch
  • <H4> Subscription Packages
  • <H4> Qualys Cloud Suite
  • <H2> A Cloud Security Platform Built for Continuous Security
  • <H3> Find vulnerabilities first, match every threat, anticipate every move
  • <H2> Trusted by 7,700+ Organizations
  • <H3> Including 50+ of the Fortune Global 100
  • <H2> 1+ Billion
  • <H3> IP Scans / Audits Performed Yearly
  • <H2> Recognized by
  • <H3> Leading Analysts & Technical Publications
  • <H2> Continuous Security in a Unified Cloud Solution
  • <H4> Find & Organize Hosts and Apps Throughout Your Network
  • <H4> Continuously Identify & Address Proliferating Security Threats
  • <H4> Find, Shield & Fix Vulnerabilities in Your Web Apps
  • <H4> Harden Your Systems & Apps
  • <H4> Make Compliance Faster, More Efficient & More Reliable
  • <H3> Qualys Subscription Packages
  • <H2> What We Do
  • <H2> Latest News More
  • <H2> Upcoming Events More
  • <H2> 7,700+ businesses, including 50+ of the Fortune Global 100 rely on Qualys
  • <H6> Qualys Solutions
  • <H6> Qualys Community
  • <H6> Other Links
  • <H6> Free Trial & Tools
  • Ukázať viac
Celkový počet 21 obrázkov na stránke.

Nasledujúci 8 obrázok nemá vyplnený štítok "alt"
Toto je potrebné doplniť čo najskôr, aby boli vyhľadávacie roboty schopné lepšie zanalizovať obrázky.

SEO audit: technológia

Skvelé! Webová stránka je dostupná len v jednej verzii, verzia bez www je presmerovaná na verziu s www.
Chyba! Favicon nebol nájdený. Použitím favicon je možné rýchlejšie si vybudovať vernosť k značke.
HTML 5
Perfektné: kódovanie charakterov je nastavené: UTF-8.
  • Chyby: 7
  • Upozornenia: 1
Ďalej na W3C chyby >>>
Skvelé! Zastaralé HTML riešenia neboli nájdené!
Skvelé! Webová stránka používa css podporujúcu tlač.
Stránka nedisponuje štandardnou stranou 404.
Je robots.txt súbor
https://www.qualys.com/robots.txt
User-agentDisallow (časti stránky zakázané pred vyhľadávacími robotmi)
*
  • /403_forbidden.html
  • /404
  • /company/events/tradeshows/2014/blackhat/reception/confirm/
  • /company/events/tradeshows/2014/qsc/confirm/
  • /company/events/tradeshows/2014/qsc/confirm/london/
  • /company/events/tradeshows/2014/qsc/confirm/munich/
  • /company/events/tradeshows/2014/qsc/confirm/paris/
  • /docs/IT_Policy_Compliance_for_Dummies.pdf
  • /docs/PCI-for-Dummies.pdf
  • /docs/Qualys_VM_Buyers_Checklist.pdf
  • /docs/VM-for-Dummies.pdf
  • /docs/WAS-for-Dummies.pdf
  • /docs/version
  • /docs/whitepapers
  • /emails
  • /form-processor
  • /forms/analyst-report/securosis-vulnerability-management-evolution/confirm/
  • /forms/become-partner/confirm/
  • /forms/briefs/pci_scanning_requirements/confirm/
  • /forms/cisco-iblm/confirm/
  • /forms/consultant-inquiry/confirm/
  • /forms/contact-sales/confirm/
  • /forms/contact-support/confirm/
  • /forms/dasient/confirm/
  • /forms/ebook/it-policy-compliance-for-dummies/confirm/
  • /forms/ebook/pcifordummies/confirm/
  • /forms/ebook/vulnerability_management_dummies/confirm/
  • /forms/ebook/wasfordummies/confirm/
  • /forms/freescan/confirm/
  • /forms/freescan/de/confirm/
  • /forms/freescan/de/exists/
  • /forms/freescan/es/confirm/
  • /forms/freescan/es/exists/
  • /forms/freescan/exists/
  • /forms/freescan/fr/confirm/
  • /forms/freescan/fr/exists/
  • /forms/freescan/owasp/confirm/
  • /forms/freescan/owasp/de/confirm/
  • /forms/freescan/owasp/de/exists/
  • /forms/freescan/owasp/exists/
  • /forms/freescan/owasp/fr/confirm/
  • /forms/freescan/owasp/fr/exists/
  • /forms/freescan/patch-tuesday/confirm/
  • /forms/freescan/patch-tuesday/de/confirm/
  • /forms/freescan/patch-tuesday/de/exists/
  • /forms/freescan/patch-tuesday/exists/
  • /forms/freescan/patch-tuesday/fr/confirm/
  • /forms/freescan/patch-tuesday/fr/exists/
  • /forms/freescan/ru/confirm/
  • /forms/freescan/ru/exists/
  • /forms/freescan/scap/confirm/
  • /forms/freescan/scap/de/confirm/
  • /forms/freescan/scap/de/exists/
  • /forms/freescan/scap/exists/
  • /forms/freescan/scap/fr/confirm/
  • /forms/freescan/scap/fr/exists/
  • /forms/freescan/website-scan/confirm/
  • /forms/freescan/website-scan/de/confirm/
  • /forms/freescan/website-scan/de/exists/
  • /forms/freescan/website-scan/exists/
  • /forms/freescan/website-scan/fr/confirm/
  • /forms/freescan/website-scan/fr/exists/
  • /forms/guides/fisma_compliance/confirm/
  • /forms/guides/pass_it_audit/confirm/
  • /forms/guides/sb1386_compliance/confirm/
  • /forms/guides/strengthening_network_security_vm/confirm/
  • /forms/guides/top_10_reports_managing_vulnerabilities/confirm/
  • /forms/guides/was_minimize_risk/confirm/
  • /forms/partners
  • /forms/pci-dss-v3/confirm/
  • /forms/pci-dss-v3/exists/
  • /forms/qualysguard/continuous-monitoring/confirm/
  • /forms/qualysguard/continuous-monitoring/exists/
  • /forms/qualysguard/pci-compliance/confirm/
  • /forms/qualysguard/pci-compliance/exists/
  • /forms/qualysguard/questionnaire/confirm/
  • /forms/qualysguard/web-application-firewall/confirm/
  • /forms/register-deal/confirm/
  • /forms/register-lead
  • /forms/reports/breaches-rise-control-systems-sans-survey/confirm/
  • /forms/reports/sans-enterprise-application-security-policy-survey-report/confirm/
  • /forms/secure-seal/confirm/
  • /forms/tangible-security-assessment/confirm/
  • /forms/trials/pci-compliance-iframe/confirm/
  • /forms/trials/qualysguard-consultant/confirm/
  • /forms/trials/qualysguard/confirm/
  • /forms/trials/qualysguard/de/confirm/
  • /forms/trials/qualysguard/de/exists/
  • /forms/trials/qualysguard/enterprise/confirm/
  • /forms/trials/qualysguard/exists/
  • /forms/trials/qualysguard/express/confirm/
  • /forms/trials/qualysguard/express/exists/
  • /forms/trials/qualysguard/fr/confirm/
  • /forms/trials/qualysguard/fr/exists/
  • /forms/trials/qualysguard/lite/confirm/
  • /forms/trials/qualysguard/lite/exists/
  • /forms/trials/qualysguard/lite/ru/confirm/
  • /forms/trials/qualysguard/lite/ru/exists/
  • /forms/was-dec2013
  • /forms/webcasts/heartbleed-emea/confirm/
  • /forms/webcasts/heartbleed/confirm/
  • /forms/webcasts/vulnerability-management-smb-forrester/confirm/
  • /forms/whitepapers/10-principaux-rapports-gerer-vulnerabilites/fr/confirm/
  • /forms/whitepapers/4_key_steps/confirm/
  • /forms/whitepapers/7-compliance-fehler-vermeiden/de/confirm/
  • /forms/whitepapers/7-etapes-vers-reduction-risques-securite/fr/confirm/
  • /forms/whitepapers/7-schritte-zur-minderung-von-sicherheitsrisiken/de/confirm/
  • /forms/whitepapers/7_steps_to_security_risk_reduction/confirm/
  • /forms/whitepapers/acceleration-deploiement-patch-renforcer-securite/fr/confirm/
  • /forms/whitepapers/analyse-applications-web-minimiser-risques-attaques/fr/confirm/
  • /forms/whitepapers/antworten-auf-risiken/de/confirm/
  • /forms/whitepapers/automate-data-compliance-grcm/confirm/
  • /forms/whitepapers/automating-sans-20-critical-controls-qualysguard/confirm/
  • /forms/whitepapers/automating-sans-20-critical-controls-qualysguard/de/confirm/
  • /forms/whitepapers/automating-sans-20-critical-controls-qualysguard/fr/confirm/
  • /forms/whitepapers/bedeutung-des-schwachstellenmanagements/de/confirm/
  • /forms/whitepapers/best-practices-auswahl-schwachstellenmanagement-losung/de/confirm/
  • /forms/whitepapers/best-practices-auswahl-web-application-scanning-losung/de/confirm/
  • /forms/whitepapers/best-practices-selecting-vulnerability-management-solution/confirm/
  • /forms/whitepapers/best-practices-selecting-web-application-scanning-solution/confirm/
  • /forms/whitepapers/best_practices_vulnerability_management/confirm/
  • /forms/whitepapers/building_was_program/confirm/
  • /forms/whitepapers/cloud-security-sicherheitsstrategien-dringend-neu-ueberdenken/de/confirm/
  • /forms/whitepapers/compliance_auditing_cloud/confirm/
  • /forms/whitepapers/continuous-monitoring-proactively-protecting-global-perimeter/confirm/
  • /forms/whitepapers/continuous-monitoring-proaktiven-schutz-gesamten-perimeters/de/confirm/
  • /forms/whitepapers/continuous-monitoring-protection-proactive-perimetre-global/fr/confirm/
  • /forms/whitepapers/continuous-security-monitoring/confirm/
  • /forms/whitepapers/database_assessment/confirm/
  • /forms/whitepapers/decouvrir-vulnerabilites-applications-web/fr/confirm/
  • /forms/whitepapers/des-postes-de-travail-securises-pour-surfer-sur-le-web/fr/confirm/
  • /forms/whitepapers/discovering-vulnerable-web-applications/confirm/
  • /forms/whitepapers/efficient_ciso/confirm/
  • /forms/whitepapers/eviter-7-erreurs-classiques-conformite-securite-it/fr/confirm/
  • /forms/whitepapers/faire-face-aux-risques/fr/confirm/
  • /forms/whitepapers/gagner-bataille-conformite-pci/fr/confirm/
  • /forms/whitepapers/gartner-magic-quadrant-application-security-testing/confirm/
  • /forms/whitepapers/gewinnen-kampf-um-pci-compliance/de/confirm/
  • /forms/whitepapers/glba-compliance/confirm/
  • /forms/whitepapers/grande-migration-securite-cloud/fr/confirm/
  • /forms/whitepapers/grosser-wandel-cloud-sicherheit/de/confirm/
  • /forms/whitepapers/hipaa-compliance/confirm/
  • /forms/whitepapers/it-sicherheit-rechtfertigen/de/confirm/
  • /forms/whitepapers/justifier-securite-it/fr/confirm/
  • /forms/whitepapers/justifying_it_security/confirm/
  • /forms/whitepapers/keep-your-pcs-safe-while-surfing-web/confirm/
  • /forms/whitepapers/massgeschneiderte-sicherheit-fuer-kleine-unternehmen/de/confirm/
  • /forms/whitepapers/meilleures-pratiques-selectionner-solution-danalyse-des-applications-web/fr/confirm/
  • /forms/whitepapers/meilleures-pratiques-selectionner-solution-gestion-des-vulnerabilites/fr/confirm/
  • /forms/whitepapers/nerc-compliance/confirm/
  • /forms/whitepapers/neue-anforderungen-sicherheit-compliance-audits-cloud/de/confirm/
  • /forms/whitepapers/nouvelles-exigences-securite-conformite-audit-cloud/fr/confirm/
  • /forms/whitepapers/patch-acceleration-for-stronger-security/confirm/
  • /forms/whitepapers/postes-travail-securises-surfer-web/fr/confirm/
  • /forms/whitepapers/responding-to-risk/confirm/
  • /forms/whitepapers/sans-critical-security-controls/confirm/
  • /forms/whitepapers/schneller-patchen-fuer-mehr-sicherheit/de/confirm/
  • /forms/whitepapers/schutzen-sie-ihre-pcs-beim-websurfen/de/confirm/
  • /forms/whitepapers/sechs-kernelemente-der-webanwendungssicherheit/de/confirm/
  • /forms/whitepapers/securite-basee-confiance-pas-sur-peur/fr/confirm/
  • /forms/whitepapers/securite-intelligente-pour-pme/fr/confirm/
  • /forms/whitepapers/security-based-on-trust-not-fear/confirm/
  • /forms/whitepapers/securosis-evolution-gestion-vulnerabilites/fr/confirm/
  • /forms/whitepapers/securosis-schwachstellenmanagement-evolution/de/confirm/
  • /forms/whitepapers/sicherheit-durch-vertrauen-statt-angst/de/confirm/
  • /forms/whitepapers/six-elements-essentiels-securite-applications-web/fr/confirm/
  • /forms/whitepapers/six-essential-elements-web-application-security/confirm/
  • /forms/whitepapers/smart-security-for-small-businesses/confirm/
  • /forms/whitepapers/smb-shift-cloud-security/confirm/
  • /forms/whitepapers/strategien-erfolgreicher-ciso/de/confirm/
  • /forms/whitepapers/strategies-efficaces-rssi/fr/confirm/
  • /forms/whitepapers/top-10-reports-schwachstellenmanagement/de/confirm/
  • /forms/whitepapers/unsichere-webanwendungen-ermitteln/de/confirm/
  • /forms/whitepapers/urgent-repenser-securite-via-cloud/fr/confirm/
  • /forms/whitepapers/web-application-scanning-angriffsrisiko-minimieren/de/confirm/
  • /forms/whitepapers/website_qualys_secure/confirm/
  • /forms/whitepapers/winning_pci_compliance_battle/confirm/
  • /forms/whitepapers/zero-day-offense-vulnerability-management/confirm/
  • /forms/whitepapers/zero-day-offense-vulnerability-management/de/confirm/
  • /forms/whitepapers/zero-day-offense-vulnerability-management/fr/confirm/
  • /google80c78de70a9d6909.html
  • /header
  • /lib
  • /lp
  • /nasdaq-investor-relations
  • /netsuite-store
  • /quazam
  • /robots.txt
  • /salesforce-service-cloud
  • /test
  • /videos/2014/qsc
  • /xml
  • Ukázať viac


Skvelé! Webová stránka používa sitemap!
https://www.qualys.com/sitemap.xml
Na stránke sa nachádza analytický kód Google Analytics.
Webová stránka používa štítky Google správcu.
Skvelé! Ak sú uvedené e-mailové adresy, tie boli utajené.