All resources sponsored by:

Core Security Technologies

15 Matches
Diary of a Healthcare CISO
sponsored by Core Security Technologies
WEBCAST:This exclusive webcast explores the most pressing challenges and security risks in the healthcare information security landscape today.
Posted: 15 Dec 2014 | Premiered: Dec 15, 2014
Get This Now


Protect Your Organization by Thinking Like an Attacker
sponsored by Core Security Technologies
VIDEO:Download this exclusive video now to learn about a solution that helps you think like an attacker while consolidating, prioritizing, and normalizing threats.
Posted: 10 Dec 2014 | Premiered: 10 Dec 2014
Get This Now


Why Attack Intelligence Matters
sponsored by Core Security Technologies
WHITE PAPER:Continue on to this informative white paper to learn how attack intelligence can analyze your vulnerability data, security events, and configuration data to give you a concise view of the attack paths to your most critical data.
Posted: 10 Dec 2014 | Published: 10 Dec 2014
Get This Now


Attack Intelligence: The Key to Reducing Risk in Healthcare
sponsored by Core Security Technologies
WHITE PAPER:This exclusive whitepaper will show how attack intelligence can help you stay in compliance with HIPAA when it comes to risk management.
Posted: 10 Dec 2014 | Published: 10 Dec 2014
Get This Now


The Threat and Vulnerability Management Maturity Model
sponsored by Core Security Technologies
WHITE PAPER:This exclusive whitepaper dives into the threat and vulnerability management maturity model, explaining how it works to reduce the risk of breach.
Posted: 10 Dec 2014 | Published: 10 Dec 2014
Get This Now


Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER:This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013
Get This Now


The Use Case for Integrated Vulnerability Management CORE Security
sponsored by Core Security Technologies
WHITE PAPER:This white paper emphasizes the importance of an effective vulnerability management infrastructure to avoid data overload challenges and explores how to stay on track by consolidating, analyzing, and prioritizing data for maximum security.
Posted: 10 Oct 2013 | Published: 10 Oct 2013
Get This Now


CORE Security and the Payment Card Industry Data Security Standard
sponsored by Core Security Technologies
WHITE PAPER:This informative resource explores a security testing method that ensures PCI DSS validation and compliance to keep payment cardholder data protected from cybercrime at all times.
Posted: 09 Oct 2013 | Published: 09 Oct 2013
Get This Now


Three Mistakes Companies Make When It Comes to Vulnerability Management
sponsored by Core Security Technologies
WHITE PAPER:In this resource, get 3 self-assessment questions to establish whether or not your approach to vulnerability management is truly successful at mitigating future security risks.
Posted: 07 Oct 2013 | Published: 07 Oct 2013
Get This Now


CORE IMPACT Pro V10
sponsored by Core Security Technologies
PRODUCT DEMO:Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.
Posted: 30 Dec 2009 | Premiered: 30 Dec 2009
Get This Now


Core IMPACT Essential
sponsored by Core Security Technologies
PRODUCT DEMO:How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.
Posted: 14 Jan 2009 | Premiered: 06 Jan 2009
Get This Now


Cascading Risk
sponsored by Core Security Technologies
WEBCAST:This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)
Get This Now


Automated Penetration Testing; Can IT Afford Not To?
sponsored by Core Security Technologies
WHITE PAPER:This paper contains an overview of penetration testing, a summary of vulnerabilities that can be revealed through penetration testing, and the business and technical benefits of performing penetration testing across your infrastructure.
Posted: 18 Jan 2007 | Published: 01 Jan 2007
Get This Now


CORE IMPACT 6.0
sponsored by Core Security Technologies
DATA SHEET:For organizations that need to ensure the security of critical or sensitive systems, CORE IMPACT is a must-have tool. This Information Security Review examines CORE IMPACT and highly recommends it as an effective security device.
Posted: 08 Jan 2007 | Published: 01 Dec 2006
Get This Now


Justification and ROI for Automated Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER:This paper will help you justify the need for an automated penetration testing product and demonstrate the positive Return on Investment (ROI) that can be achieved.
Posted: 19 Sep 2005 | Published: 01 Sep 2005
Get This Now


15 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement