IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Vulnerability Assessments

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Vulnerability Assessment, Network Vulnerability, Security Vulnerabilities, Network Security Vulnerabilities, Vulnerabilities, Host Vulnerability Assessment, Internet Security Vulnerabilities
DEFINITION: A vulnerability scanner is a program that performs the diagnostic phase of a vulnerability analysis,also known as vulnerability assessment. Vulnerability analysis defines,identifies, and classifies the security holes (vulnerabilities) in acomputer, server, network, or communications infrastructure. Inaddition, vulnerability analysis can forecast the effectiveness ofproposed countermeasures, and evaluate  … 
Definition continues below.
Vulnerability AssessmentsWhite Papers (View All Report Types)
101 - 125 of 137 Matches Previous Page  | Next Page
Enabling a safer internet: The positive approach to web security
sponsored by Sophos, Inc.
WHITE PAPER: This paper describes today's new web threats, highlights the need for a positive security model to replace yesterday's access-blocking approach, and describes the three pillars of protection organizations need to safeguard their systems and resources.
Posted: 09 Apr 2009 | Published: 08 Apr 2009

Sophos, Inc.

Achieving North American Electric Reliability Corporation (NERC) Cyber Security Standards
sponsored by Lumension
WHITE PAPER: Learn about NERC compliance challenges and how to ensure audit-readiness by delivering end-to-end vulnerability management, endpoint protection and data protection solutions.
Posted: 06 Apr 2009 | Published: 02 Mar 2009

Lumension

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.
Posted: 26 Mar 2009 | Published: 01 Apr 2008

Symantec Corporation

Cisco Continuous Data Protection for Files
sponsored by Cisco Systems, Inc.
WHITE PAPER: Most analysts, including Enterprise Strategy Group, agree that performing only a periodic backup leaves data at risk, and they find that this is a major concern among the IT professionals they survey. The answer to this concern is Cisco Small Business Network Storage Systems (NSS) and Cisco Continuous Data Protection (CDP) for Files software.
Posted: 25 Mar 2009 | Published: 25 Mar 2009

Cisco Systems, Inc.

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by IBM
WHITE PAPER: This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

Support PCI Security Compliance with Enhanced Solutions from IBM
sponsored by IBM
WHITE PAPER: This white paper briefly describes PCI requirements, the benefits of compliance and the penalties for noncompliance.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

Understanding Web Application Security Challenges
sponsored by IBM
WHITE PAPER: This paper explains what you can do to help protect your organization, and it discusses an approach for improving your organization's Web application security.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

Creating an Effective Security Operations Function
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Read this white paper to understand all the activities and roles in a security operations function - your first step in making those operations more effective and efficient.
Posted: 17 Oct 2008 | Published: 16 Oct 2008

RSA, The Security Division of EMC

Protecting Essential Information: Securing the Foundation of the Internet Business Platform
sponsored by Websense, Inc.
WHITE PAPER: Today's threats use Web 2.0 to integrate daily operations which has changed the requirements for web security, email security and data loss prevention. Download this white paper to learn more.
Posted: 31 Jul 2008 | Published: 01 Jul 2008

Websense, Inc.

Integrating Vulnerability Assessment and Remediation
sponsored by Lumension
WHITE PAPER: An outline for successfully integrating vulnerability scanning and remediation capabilities is presented in this whitepaper. This will ensure that organizations maintain a secure environment while complying with internal and external security policies.
Posted: 10 Jul 2008 | Published: 01 Oct 2007

Lumension

3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER: This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008

Foundstone, Inc.

A Comprehensive Best Practice Approach to Business Resilience and Risk Mitigation
sponsored by IBM
WHITE PAPER: This white paper serves as a comprehensive, best-practices approach to business resilience and risk mitigation. Common types of risk and the steps organizations must take to develop an effective risk mitigation strategy are discussed.
Posted: 29 May 2008 | Published: 01 Sep 2007

IBM

Dispelling Top Ten Wireless Security Myths
sponsored by AirTight Networks, Inc.
WHITE PAPER: Myths about wireless security can be both dangerous and costly, this paper will revisit and debunk top ten wireless security myths.
Posted: 16 May 2008 | Published: 01 May 2008

AirTight Networks, Inc.

Airspace Risk Assessment
sponsored by AirTight Networks, Inc.
WHITE PAPER: This report is the first step towards wireless vulnerability assessment of your network and managing its wireless security posture.
Posted: 16 May 2008 | Published: 01 May 2008

AirTight Networks, Inc.

Security Beyond Corporate Boundaries: Using Citrix Application Delivery to Protect Corporate Information
sponsored by Citrix
WHITE PAPER: Ensuring your data security goes beyond the implementation of firewalls and spyware. This white paper discusses key information on virtualization deployment, and offers tips to better manage your disaster recovery enviroment.
Posted: 05 May 2008 | Published: 01 Apr 2008

Citrix

Acquire a global view of your organization's security state: the importance of security assessments
sponsored by IBM Software Group
WHITE PAPER: Security assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.
Posted: 09 Jan 2008 | Published: 09 Jan 2008

IBM Software Group

The importance of security assessments
sponsored by IBM
WHITE PAPER: This white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM

Drive business value with innovation for security defense
sponsored by IBM
WHITE PAPER: This white paper details an integrated approach to security that can help your company address security threats while supporting compliance and protecting data, Internet-based systems, physical environments and applications.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM

Putting Security in a Positive Light - A Guide to Proactively Managing Endpoint Risk
sponsored by Lumension
WHITE PAPER: This white paper outlines the importance of adopting a positive security model that combines the power of vulnerability management, automated remediation, whitelist application and device control to eliminate the risk of the unknown.
Posted: 29 Oct 2007 | Published: 10 Sep 2007

Lumension

Justifying Data Security: An Investment in Competitive Advantage
sponsored by Websense, Inc.
WHITE PAPER: For process improvement, regulatory compliance, and competitive advantage; information leak protection is a vital part of securing internal data. Automated solutions accelerate the effectiveness of security controls while maintaining regulatory compliance
Posted: 06 Sep 2007 | Published: 26 Aug 2007

Websense, Inc.

Extend Business Reach with a Robust Security Infrastructure
sponsored by IBM Software Group
WHITE PAPER: This white paper discusses the advantages of a security management solution designed to deliver integrated, comprehensive solutions across a heterogeneous environment.
Posted: 03 Aug 2007 | Published: 01 Jul 2007

IBM Software Group

7 Key Factors to Software Protection
sponsored by Arxan
WHITE PAPER: This white paper explores the magnitude and types of software piracy threats and details the seven key application security factors that must be considered during the development process.
Posted: 08 Jun 2007 | Published: 01 Jun 2007

Arxan

Seven Practical Steps to Delivering More Secure Software
sponsored by Fortify Software
WHITE PAPER: This paper provides seven practical steps that help to effectively secure your company's software and shows you how to quickly evaluate the current state of software security and create a plan for dealing with it throughout the development life-cycle.
Posted: 07 May 2007 | Published: 01 Dec 2006

Fortify Software

Top 10 Reasons for Using Disk-based Online Server Backup and Recovery
sponsored by Iron Mountain
WHITE PAPER: Backup of business-critical data can be vital for the survival of any small to medium-sized business (SMBs). Read this paper to learn ten reasons why online server back up allows SMBs to cost-effectively backup data and concentrate on business goals.
Posted: 21 Feb 2007 | Published: 21 Feb 2007

Iron Mountain
101 - 125 of 137 Matches Previous Page    3 4 5 6    Next Page
 
VULNERABILITY ASSESSMENTS DEFINITION (continued): …  how well they work after theyare put into use.A vulnerability scanner relies on a database that contains allthe information required to check a system for security holes inservices and ports, anomalies in packet construction, and potentialpaths to exploitable programs or scripts. Then the scanner tries toexploit each vulnerability that is discovered. This process issometimes called ethical hacking.An ideal vulnerability scanner has capabilities such as the following: Maintenance of an up-to-date database of vulnerabilities. Detection of genuine vulnerabilities without an excessive number of … 
Vulnerability Assessments definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement