IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Host Vulnerability Assessment

RSS Feed    Add to Google    Add to My Yahoo!
Host Vulnerability Assessment Multimedia (View All Report Types)
 
Rational® AppScan® Standard Edition V7.8
sponsored by IBM
TRIAL SOFTWARE: Rational® AppScan® Standard Edition V7.8 automates vulnerability assessments and scans and tests for all common Web application vulnerabilities including SQL-injection, cross-site scripting, and buffer overflow.
Posted: 16 Mar 2009 | Premiered: 13 Mar 2009

IBM

SecuritySCAPE Virtual Conference 2012: IT Security Made Simple
sponsored by Lumension
VIRTUAL SEMINAR: Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world.
Posted: 12 Sep 2012 | Premiered: 25 Sep 2012

Lumension

Predictive Security Intelligence for Retail Organizations
sponsored by Q1 Labs, an IBM Company
WEBCAST: This webcast explores how to add a new dimension to security intelligence through risk management. Extend the value of SIEM and Log Management to determine risk levels throughout your network by integrating vulnerability assessment scan results, network behavior analysis and topology, device configurations, policies, and compliance management.
Posted: 24 Feb 2012 | Premiered: Feb 24, 2012

Q1 Labs, an IBM Company

Tivoli Endpoint Manager: Continuous Compliance In A Distributed World
sponsored by Mainline Information Systems
WEBCAST: Through this webcast you will learn about endpoint security and the new solutions being offered with more tools included than previous years. You will find out how endpoint security is made up a various security tools in order to meet compliance standards and increase your organizations bottom line.
Posted: 31 May 2011 | Premiered: May 26, 2011

Mainline Information Systems

AlienVault Unified Security Management: Complete Security Visibility
sponsored by AlienVault
TRIAL SOFTWARE: AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

AlienVault

Expect More From Your SIEM
sponsored by AlienVault
WEBCAST: Unlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. During this session, we'll cover a few common problems with SIEM technologies, and how you can avoid them. You'll walk away with a new perspective on an old problem – reducing the cost of security visibility.
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AlienVault

Identity Finder Enterprise Suite 4.5
sponsored by Identity Finder, LLC
TRIAL SOFTWARE: Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.
Posted: 26 Jul 2010 | Premiered: 26 Jul 2010

Identity Finder, LLC

VigilEnt Policy Center 4.2 Trial
sponsored by SUSE
TRIAL SOFTWARE: VigilEnt™ Policy Center is the most comprehensive solution for developing, implementing and managing policies, standards and procedures from any department within your organization.
Posted: 09 Aug 2006 | Premiered: 01 Aug 2006

SUSE

Podcast: Insider Threats - an Interview with the Former Deputy Director of the National Security Agency - NSA
sponsored by Imperva
PODCAST: Bill Crowell, former Deputy Director of the NSA, is interviewed in this podcast. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection –- especially around mission-critical applications and databases.
Posted: 12 Nov 2009 | Premiered: Nov 12, 2009

Imperva

Disclosures 2012 - The Vulnerability of Publicly Traded Companies
sponsored by Veracode, Inc.
WEBCAST: In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software.
Posted: 24 May 2012 | Premiered: May 23, 2012

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement