IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Vulnerability Assessments

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Vulnerability Assessment, Network Vulnerability, Security Vulnerabilities, Network Security Vulnerabilities, Vulnerabilities, Host Vulnerability Assessment, Internet Security Vulnerabilities
DEFINITION: A vulnerability scanner is a program that performs the diagnostic phase of a vulnerability analysis,also known as vulnerability assessment. Vulnerability analysis defines,identifies, and classifies the security holes (vulnerabilities) in acomputer, server, network, or communications infrastructure. Inaddition, vulnerability analysis can forecast the effectiveness ofproposed countermeasures, and evaluate  … 
Definition continues below.
Vulnerability AssessmentsWhite Papers (View All Report Types)
1 - 25 of 163 Matches Previous Page  | Next Page
Guarding Against a Data Breach
sponsored by Hewlett-Packard Company
WHITE PAPER: In this informative white paper, discover how modern enterprises should respond to growing security threats while balancing economic and organizational concerns.
Posted: 22 Aug 2014 | Published: 31 Jan 2012

Hewlett-Packard Company

Ponemon Report: The Real Cost of Cyber Crime in 2013
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this Poenmon study to discover the average cost to businesses of cyber crime, and how organizations can take steps to reduce security risks and costs.
Posted: 22 Aug 2014 | Published: 31 Oct 2013

Hewlett-Packard Company

Advanced Security Threats: Are You Prepared?
sponsored by Symantec Corporation
WHITE PAPER: In this RSA survey, learn which IT areas are still a security challenge, and what industry leaders recommend.
Posted: 22 Aug 2014 | Published: 28 Feb 2014

Symantec Corporation

Ponemon Study: The Real Cost of Data Breaches in 2014
sponsored by IBM
WHITE PAPER: In this Ponemon study, get the facts on whether your organization might be the target of a devastating cyber-attack, and on the proven methods for best protecting and preserving your business.
Posted: 22 Aug 2014 | Published: 31 May 2014

IBM

Rising Cyber Crime Mandates More Effective Security Measures
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this in-depth white paper, get the facts from industry veterans on how to best prevent data breaches and implement effective risk management.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Limited

Get the Facts On APTs To Avoid Misguided Security Efforts
sponsored by IBM
WHITE PAPER: This expert E-Guide cuts through the confusion, explaining exactly what APT is, what they are capable of, and how you can best defend your organization from them.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

Top Six Steps to Boost Advanced Persistent Threat Security
sponsored by IBM
WHITE PAPER: In this expert E-guide, discover the six steps your organization can take to mitigate the threat of APTs, including building a growing security team, cross functional integration, centralized logs, and more.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

Protection for Every Enterprise: Maximizing Mobile Security
sponsored by BlackBerry
WHITE PAPER: In this helpful white paper, get the facts on mobile security and the best protections strategies from today's advanced cyber threats.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

BlackBerry

The Top 8 Mobile Security Risks: Is Your Organzation Protected?
sponsored by BlackBerry
WHITE PAPER: In this essential white paper, discover the top 8 security risks for mobile devices and determine if your organization's assets are properly protected.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

BlackBerry

Ushering in a New Era in Mobile Data Security
sponsored by Bluebox
WHITE PAPER: In this informative white paper, discover a new mobile security platform that balances effective protection, data visibility, and app accessibility and freedom for the user.
Posted: 18 Aug 2014 | Published: 20 Aug 2014

Bluebox

Advanced Persistent Threats: Expert Strategies for IT Security
sponsored by IBM
WHITE PAPER: This expert E-Guide outlines the best practices for organizations to defend themselves against these malicious attacks and to prevent them before they happen.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

IBM

Research Report: Mobile Security Trends in the Workplace
sponsored by Bluebox
WHITE PAPER: In this informative report, get the facts on enterprise mobility trends and BYOD programs, and discover how organizations should adapt to this changing IT security landscape.
Posted: 15 Aug 2014 | Published: 30 Jun 2014

Bluebox

Vulnerability Assessment and Penetration Testing: Can You Afford Not To?
sponsored by Pwine Express
WHITE PAPER: This informative white paper explains why vulnerability assessment and penetration testing are such critical tools in the fight against modern cybercrime, as well as how they can make a difference in your organization's security solution.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

Pwine Express

Diversionary and Multivector DDoS Attacks
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this essential white paper, you'll learn about the rise of these destructive attacks, why they are so difficult to block, and how an integrated security solution could help keep your organization protected.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Juniper Networks, Inc.

The New Breed of DDoS Attacks: An Executive Brief
sponsored by Juniper Networks, Inc.
WHITE PAPER: This informative resource breaks down the new breed of DDoS attacks, and provides strategies for keeping your organization protected.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Juniper Networks, Inc.

Cybersecurity’s Maginot Line: A Real-World Assessment Of The Defense-In-Depth Model
sponsored by FireEye
WHITE PAPER: This essential white paper outlines how organizations can update their security solutions for the modern age by reducing waste on redundant, backward-looking technology, and refocusing on defenses designed to stop today's cyber attacks.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

FireEye

Implement a Risk Management Platform to Dodge Vulnerabilities
sponsored by BeyondTrust Corporation
WHITE PAPER: This resource introduces a collaborative approach to IT risk management by integrating two security methodologies: privileged account management and vulnerability management.
Posted: 05 Aug 2014 | Published: 30 Jan 2014

BeyondTrust Corporation

Reducing the Cost and Complexity of Web Vulnerability Management
sponsored by Symantec
WHITE PAPER: This white paper investigates how to reduce the cost and complexity of Web vulnerability management with a managed approach for detection.
Posted: 05 Aug 2014 | Published: 31 Dec 2012

Symantec

The Key to Protecting your Website is Knowledge
sponsored by Symantec
WHITE PAPER: Learn how vulnerabilities can seriously affect your organisation if the proper steps aren't taken towards protection.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Symantec

Cisco 2014 Midyear Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: As the Internet of Things accelerates, adversaries will spend even more time finding weak links across the threat landscape and using them to their advantage to compromise systems and data. Download this white paper to learn about these threats as well as industry-specific risks.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Cisco Systems, Inc.

Privileged Account Security: Protect Your Data without Sacrificing Efficiency
sponsored by BeyondTrust Corporation
WHITE PAPER: Read this white paper to learn how new security solutions can help your business manage privileged account security without sacrificing efficiency.
Posted: 01 Aug 2014 | Published: 28 Feb 2014

BeyondTrust Corporation

Context-Aware Vulnerability Management: The Basics
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines the benefits of context-aware vulnerability management solutions, and if it is the right security solution for your organization.
Posted: 01 Aug 2014 | Published: 31 Jan 2014

BeyondTrust Corporation

Transitioning from Log Management and SIEM to Comprehensive Security Intelligence
sponsored by IBM
WHITE PAPER: This white paper discusses how security intelligence addresses these shortcomings and empowers organizations—from Fortune Five companies to midsize enterprises to government agencies— to maintain comprehensive and cost-effective information security. It will show how security intelligence addresses critical concerns in five key areas.
Posted: 31 Jul 2014 | Published: 31 Jan 2013

IBM

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by IBM
WHITE PAPER: This highly informative white paper from Gartner objectively evaluates a variety of SIEM technologies on a number of critical dimensions, including market responsiveness, customer experience, and pricing.
Posted: 28 Jul 2014 | Published: 25 Jun 2014

IBM

Combatting APTs with a Defense-in-Depth Security Approach
sponsored by CDW Corporation
WHITE PAPER: This informative white paper contains critical information on why a defense-in-depth security approach has proven effective in protecting organizations' sensitive data from APTs.
Posted: 22 Jul 2014 | Published: 05 Mar 2014

CDW Corporation
1 - 25 of 163 Matches Previous Page    1 2 3 4    Next Page
 
VULNERABILITY ASSESSMENTS DEFINITION (continued): …  how well they work after theyare put into use.A vulnerability scanner relies on a database that contains allthe information required to check a system for security holes inservices and ports, anomalies in packet construction, and potentialpaths to exploitable programs or scripts. Then the scanner tries toexploit each vulnerability that is discovered. This process issometimes called ethical hacking.An ideal vulnerability scanner has capabilities such as the following: Maintenance of an up-to-date database of vulnerabilities. Detection of genuine vulnerabilities without an excessive number of … 
Vulnerability Assessments definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement