IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Vulnerability Assessments

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Vulnerability Assessment, Network Vulnerability, Security Vulnerabilities, Network Security Vulnerabilities, Vulnerabilities, Host Vulnerability Assessment, Internet Security Vulnerabilities
DEFINITION: An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacking is also known as penetration testing, intrusion testing  … 
Definition continues below.
Vulnerability Assessments White Papers (View All Report Types)
101 - 125 of 152 Matches Previous Page  |  Next Page
BeyondTrust 2009 Microsoft Vulnerability Analysis
sponsored by BeyondTrust Corporation
WHITE PAPER: This report demonstrates the critical role that restricting administrator rights plays in protecting against vulnerabilities. It is important to note that this increased protection is achievable in one simple step without any impact on productivity — by implementing a desktop Privilege Identity Management solution.
Posted: 05 Apr 2010 | Published: 01 Apr 2010

BeyondTrust Corporation

Four Steps to Cure Your Patch Management Headache
sponsored by Lumension
WHITE PAPER: Using patch and vulnerability management as the principal component of your risk mitigation strategy and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term.
Posted: 11 Feb 2010 | Published: 11 Feb 2010


2010: Cybercrime Coming of Age
sponsored by ESET
WHITE PAPER: In this paper you'll read that cybercrime is on the rise, not only in terms of the number of perpetrators and the volume of crimes committed, but also in terms of the range of techniques employed to carry them out.
Posted: 02 Feb 2010 | Published: 01 Jan 2010


Considerations for Integrating Intelligence into Security Operations
sponsored by VeriSign EMEA
WHITE PAPER: This whitepaper outlines four critical elements of cyber security intelligence that organizations must meet to ensure that the integration of the intelligence will help improve the safety and profitability of enterprises. This paper also presents specific questions to ask when determining the best approach for an overall risk-mitigation strategy.
Posted: 23 Dec 2009 | Published: 03 Dec 2009

VeriSign EMEA

Understanding Why Web Application Security is Critical to Business
sponsored by Sirius Computer Solutions
WHITE PAPER: This paper compiles clients’ frequently asked questions about Web application security. These questions are answered by security experts from Sirius and IBM. The goal is to help you understand the issues surrounding Web application security; so you can better prepare your organization for a security breach.
Posted: 13 Oct 2009 | Published: 01 Sep 2009

Sirius Computer Solutions

Realizing Asset-Centric and User-Centric Approaches to Security
sponsored by RES Software
WHITE PAPER: This white paper presents an overview of both the asset-centric and the user-centric approaches to security. These approaches will be mapped towards the standard for Information Security: ISO 17799.
Posted: 18 Sep 2009 | Published: 18 Sep 2009

RES Software

10 Common Pitfalls to Avoid When Evaluating Security Information Management (SIM) Solutions
sponsored by netForensics
WHITE PAPER: This paper was created to help companies searching for a SIM solution narrow their options and determine which technology is the right one for their IT environment and security objectives.
Posted: 10 Sep 2009 | Published: 10 Sep 2009


Healthcare Data Loss Assessment: Measure sensitive patient data loss on your network
sponsored by Code Green Networks, Inc.
WHITE PAPER: Loss of patient data is a top concern for any healthcare organization. They handle some of the most sensitive and personal data on the individuals they treat. Patients trust healthcare organizations to safeguard sensitive data. Read this whitepaper to find more about how a data loss prevention (DLP) solution can protect patient data.
Posted: 09 Sep 2009 | Published: 09 Sep 2009

Code Green Networks, Inc.

Unraveling Web Malware
sponsored by FireEye
WHITE PAPER: There has been a rapid rise in the use of web blended threats. Defending corporate networks from these threats requires modern protection that functions on many levels. Find out how cyber criminals infiltrate your network and how FireEye's blended defense against Web malware prevents data loss and intellectual property theft.
Posted: 01 Sep 2009 | Published: 29 Sep 2008


Real World Intrusion Prevention (IPS) for the Demands of a New Security Reality
sponsored by TippingPoint
WHITE PAPER: This whitepaper addresses primary areas that organizations must consider when evaluating possible solutions for intrusion prevention. Topics include: key network security challenged facing enterprises today; criteria for an effective IPS solution; And insights gained from enterprises already deploying IPS solutions in the real world.
Posted: 26 Aug 2009 | Published: 25 Aug 2009


The Hidden Security Threat -- When Ex-Employees Represent a Security Risk
sponsored by Kaspersky Lab
WHITE PAPER: From the laid-off to the disgruntled, ex-employees with an axe to grind can make companies vulnerable to data theft. Kaspersky Lab security evangelist Ryan Naraine discusses the threat and offers practical advice to prevent data loss.
Posted: 19 Aug 2009 | Published: 19 Aug 2009

Kaspersky Lab

When Less Is More: Why Small Companies Should Think Outside the (Red/ Yellow) Box for Protecting Endpoints
sponsored by Sunbelt Software
WHITE PAPER: Endpoint security issues simply can't be ignored, regardless of the size of the organization. This paper will discuss how internet threats and vulnerabilities affect us all and what criteria businesses should use in order to pick out a proper endpoint security solution.
Posted: 30 Jul 2009 | Published: 30 Jul 2009

Sunbelt Software

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions
sponsored by Lumension
WHITE PAPER: The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management.
Posted: 18 Jun 2009 | Published: 28 May 2009


The Top Five Virtualization Mistakes
sponsored by Vyatta Inc.
WHITE PAPER: This paper describes five mistakes common to many implementations of enterprise virtualization. Most of these mistakes relate to virtualization and networking infrastructure. Ideally, after reading this paper, you'll be sensitized to these issues so that you can plan for them and make your virtualization projects more successful.
Posted: 17 Jun 2009 | Published: 01 Jun 2007

Vyatta Inc.

Achieving PCI Compliance at the Point Of Sale Using Bit9 Parity™ to Protect Cardholder Data
sponsored by Bit9, Inc.
WHITE PAPER: As the technology used by merchants and their partners has evolved, card fraud has become more sophisticated. In response to this evolving threat, the major credit card companies have created a set of security standards to protect their customers from security breaches. Read this whitepaper to find out how Bit9 Parity helps achieve compliance...
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Bit9, Inc.

Enabling a safer internet: The positive approach to web security
sponsored by Sophos, Inc.
WHITE PAPER: This paper describes today's new web threats, highlights the need for a positive security model to replace yesterday's access-blocking approach, and describes the three pillars of protection organizations need to safeguard their systems and resources.
Posted: 09 Apr 2009 | Published: 08 Apr 2009

Sophos, Inc.

Achieving North American Electric Reliability Corporation (NERC) Cyber Security Standards
sponsored by Lumension
WHITE PAPER: Learn about NERC compliance challenges and how to ensure audit-readiness by delivering end-to-end vulnerability management, endpoint protection and data protection solutions.
Posted: 06 Apr 2009 | Published: 02 Mar 2009


Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.
Posted: 26 Mar 2009 | Published: 01 Apr 2008

Symantec Corporation

Cisco Continuous Data Protection for Files
sponsored by Cisco Systems, Inc.
WHITE PAPER: Most analysts, including Enterprise Strategy Group, agree that performing only a periodic backup leaves data at risk, and they find that this is a major concern among the IT professionals they survey. The answer to this concern is Cisco Small Business Network Storage Systems (NSS) and Cisco Continuous Data Protection (CDP) for Files software.
Posted: 25 Mar 2009 | Published: 25 Mar 2009

Cisco Systems, Inc.

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by IBM
WHITE PAPER: This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 13 Feb 2009 | Published: 13 Feb 2009


Support PCI Security Compliance with Enhanced Solutions from IBM
sponsored by IBM
WHITE PAPER: This white paper briefly describes PCI requirements, the benefits of compliance and the penalties for noncompliance.
Posted: 13 Feb 2009 | Published: 13 Feb 2009


Understanding Web Application Security Challenges
sponsored by IBM
WHITE PAPER: This paper explains what you can do to help protect your organization, and it discusses an approach for improving your organization's Web application security.
Posted: 13 Feb 2009 | Published: 13 Feb 2009


Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008


Creating an Effective Security Operations Function
sponsored by RSA
WHITE PAPER: Read this white paper to understand all the activities and roles in a security operations function - your first step in making those operations more effective and efficient.
Posted: 17 Oct 2008 | Published: 16 Oct 2008


Protecting Essential Information: Securing the Foundation of the Internet Business Platform
sponsored by Websense, Inc.
WHITE PAPER: Today's threats use Web 2.0 to integrate daily operations which has changed the requirements for web security, email security and data loss prevention. Download this white paper to learn more.
Posted: 31 Jul 2008 | Published: 01 Jul 2008

Websense, Inc.
101 - 125 of 152 Matches Previous Page    3 4 5 6 7    Next Page
VULNERABILITY ASSESSMENTS DEFINITION (continued): …  and red teaming. An ethical hacker is sometimes called a white hat, a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat. One of the first examples of ethical hackers at work was in the 1970s, when the United States government used groups of experts called red teams to hack its own computer systems. According to Ed Skoudis, Vice President of Security Strategy for Predictive Systems' Global Integrity consulting practice, ethical hacking has continued to grow in an otherwise lackluster IT industry, and is becoming increasingly common … 
Vulnerability Assessments definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement