IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Vulnerability Assessments

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Vulnerability Assessment, Network Vulnerability, Security Vulnerabilities, Network Security Vulnerabilities, Vulnerabilities, Host Vulnerability Assessment, Internet Security Vulnerabilities
DEFINITION: A vulnerability scanner is a program that performs the diagnostic phase of a vulnerability analysis,also known as vulnerability assessment. Vulnerability analysis defines,identifies, and classifies the security holes (vulnerabilities) in acomputer, server, network, or communications infrastructure. Inaddition, vulnerability analysis can forecast the effectiveness ofproposed countermeasures, and evaluate  … 
Definition continues below.
Vulnerability AssessmentsIT Downloads (View All Report Types)
15 Matches
Unified Threat Management Provides Simplified Management and Increase Security
sponsored by Sophos, Inc.
SOFTWARE DEMO: Check this software trial download to experience firsthand how new UTM solutions can help boost your current security solution with centralized management, flexible deployment, and high performance.
Posted: 18 Sep 2014 | Premiered: 18 Sep 2014

Sophos, Inc.

New Software Solution provides Real-Time Threat Detection and Visibility from Day 1
sponsored by AlienVault
SOFTWARE DOWNLOAD: This resource contains a free 30-day trial of an innovative new Unified Security Management platform, designed and priced to aid mid-market organizations in obtaining complete security visibility and advanced threat intelligence.
Posted: 24 Jul 2014 | Premiered: 24 Jul 2014

AlienVault

AlienVault Unified Security Management: Complete Security Visibility
sponsored by AlienVault
TRIAL SOFTWARE: AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

AlienVault

Lumension Endpoint Management and Security Suite
sponsored by Lumension
TRIAL SOFTWARE: A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority.
Posted: 13 Sep 2010 | Premiered: 13 Sep 2010

Lumension

Identity Finder Enterprise Suite 4.5
sponsored by Identity Finder, LLC
TRIAL SOFTWARE: Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.
Posted: 26 Jul 2010 | Premiered: 26 Jul 2010

Identity Finder, LLC

CORE IMPACT Pro V10
sponsored by Core Security Technologies
PRODUCT DEMO: Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.
Posted: 30 Dec 2009 | Premiered: 30 Dec 2009

Core Security Technologies

Rational® AppScan® Standard Edition V7.8
sponsored by IBM
TRIAL SOFTWARE: Rational® AppScan® Standard Edition V7.8 automates vulnerability assessments and scans and tests for all common Web application vulnerabilities including SQL-injection, cross-site scripting, and buffer overflow.
Posted: 16 Mar 2009 | Premiered: 13 Mar 2009

IBM

Core IMPACT Essential
sponsored by Core Security Technologies
PRODUCT DEMO: How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.
Posted: 14 Jan 2009 | Premiered: 06 Jan 2009

Core Security Technologies

Online Demo - Vulnerability Management & Policy Compliance Overview
sponsored by Qualys, Inc.
SOFTWARE DEMO: Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
Posted: 09 Apr 2007 | Premiered: 09 Apr 2007

Qualys, Inc.

AppDetective
sponsored by Application Security, Inc.
TRIAL SOFTWARE: Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.
Posted: 17 Nov 2006 | Premiered: 01 Mar 2006

Application Security, Inc.

VigilEnt Policy Center 4.2 Trial
sponsored by SUSE
TRIAL SOFTWARE: VigilEnt™ Policy Center is the most comprehensive solution for developing, implementing and managing policies, standards and procedures from any department within your organization.
Posted: 09 Aug 2006 | Premiered: 01 Aug 2006

SUSE

NetIQ Security Solutions for iSeries Trial
sponsored by SUSE
TRIAL SOFTWARE: NetIQ Security Solutions for iSeries offer proven protection to hundreds of customers on thousands of servers, providing simplified auditing, vulnerability management and security administration for your iSeries and AS/400 systems.
Posted: 09 Aug 2006 | Premiered: 01 Aug 2006

SUSE

NetIQ Security Manager 5.5 Trial
sponsored by SUSE
TRIAL SOFTWARE: NetIQ Security Manager delivers comprehensive security information and event management for your organization's heterogeneous, cross-platform environment.
Posted: 09 Aug 2006 | Premiered: 01 Aug 2006

SUSE

Directory and Resource Administrator 7.5 Trial
sponsored by SUSE
TRIAL SOFTWARE: NetIQ's Directory and Resource Administrator provides advanced delegation and robust, policy-based administration capabilities that improve the security and efficiency of your Microsoft Windows environment.
Posted: 09 Aug 2006 | Premiered: 01 Aug 2006

SUSE

AppManager 6.0.2 Trial
sponsored by SUSE
TRIAL SOFTWARE: The NetIQ AppManager Suite product (AppManager Suite) enables IT organizations to meet their service level commitments while maximizing staff efficiency, with deep real-time diagnostics.
Posted: 09 Aug 2006 | Premiered: 01 Aug 2006

SUSE
15 Matches
 
VULNERABILITY ASSESSMENTS DEFINITION (continued): …  how well they work after theyare put into use.A vulnerability scanner relies on a database that contains allthe information required to check a system for security holes inservices and ports, anomalies in packet construction, and potentialpaths to exploitable programs or scripts. Then the scanner tries toexploit each vulnerability that is discovered. This process issometimes called ethical hacking.An ideal vulnerability scanner has capabilities such as the following: Maintenance of an up-to-date database of vulnerabilities. Detection of genuine vulnerabilities without an excessive number of … 
Vulnerability Assessments definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement