IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Vulnerability Assessments

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Vulnerability Assessment, Network Vulnerability, Security Vulnerabilities, Network Security Vulnerabilities, Vulnerabilities, Host Vulnerability Assessment, Internet Security Vulnerabilities
DEFINITION: A vulnerability scanner is a program that performs the diagnostic phase of a vulnerability analysis,also known as vulnerability assessment. Vulnerability analysis defines,identifies, and classifies the security holes (vulnerabilities) in acomputer, server, network, or communications infrastructure. Inaddition, vulnerability analysis can forecast the effectiveness ofproposed countermeasures, and evaluate  … 
Definition continues below.
Vulnerability AssessmentsWhite Papers (View All Report Types)
101 - 125 of 168 Matches Previous Page  | Next Page
Help Strengthen Security by Building a Trusted Identity Environment
sponsored by IBM
WHITE PAPER: As more people cross more borders – physically and virtually – the need to implement a reliable human identity system for proper verification becomes crucial. Read on to see how IBM dissuades credential abuse while helping customs, border management and law enforcement organizations ensure the safety and security of citizens and workers.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

Virus Bulletin: Comparative Reviews August-December 2010
sponsored by ESET
WHITE PAPER: Read this paper to view the latest news and information about VB100 testing,  Windows Vista,  Windows 7, Windows Server 2003, Windows 7 Professional, and  so much more.
Posted: 14 Dec 2010 | Published: 14 Dec 2010

ESET

Global Threat Trends: October 2010
sponsored by ESET
WHITE PAPER: Read this month's Global Threat Trends to learn about the top 10 security threats in October. Discover what’s new on the cyber front and get an inside look at this year's eCity Symposium, and more!
Posted: 10 Nov 2010 | Published: 10 Nov 2010

ESET

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva
WHITE PAPER: For each threat, the paper describes background information, general risk mitigation strategies, and the database protection provided by Imperva SecureSphere Database Security Solutions.
Posted: 02 Sep 2010 | Published: 02 Sep 2010

Imperva

The Right Tool for the Right Job: An Application Security Tools Report Card
sponsored by IBM
WHITE PAPER: This white paper examines the most common tools found in the enterprise application security environment.
Posted: 26 Aug 2010 | Published: 26 Aug 2010

IBM

The Anatomy of a Cross-Site Scripting Campaign
sponsored by Imperva
WHITE PAPER: XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.
Posted: 23 Aug 2010 | Published: 23 Aug 2010

Imperva

Malware Security Report: Protecting Your Business, Customers and Bottom Line
sponsored by VeriSign Australia
WHITE PAPER: This white paper will help you understand the threats from Malware and how it can impact your online business. You’ll learn about criminals’ motivations for distributing malware through the web and how they infect web servers to make distribution possible, as well as techniques administrators can use to detect them.
Posted: 06 Aug 2010 | Published: 06 Aug 2010

VeriSign Australia

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust
sponsored by VeriSign Australia
WHITE PAPER: This paper explores new developments in website security that online businesses should be implementing to build confidence in their sites, protect valuable brands and safeguard customers’ sensitive information, not to mention improving their bottom line.
Posted: 06 Aug 2010 | Published: 06 Aug 2010

VeriSign Australia

Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity
sponsored by Information Security Magazine
WHITE PAPER: The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.
Posted: 21 Jul 2010 | Published: 21 Jul 2010

Information Security Magazine

Data Protection Solutions at Midsize Organizations
sponsored by Trend Micro, Inc.
WHITE PAPER: In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100- 5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches and more.
Posted: 15 Jul 2010 | Published: 01 Feb 2008

Trend Micro, Inc.

Avoiding the Top 5 Vulnerability Management Mistakes: The New Rules of Vulnerability Management
sponsored by eEye Digital Security
WHITE PAPER: In this guide, you’ll learn how to avoid the top five vulnerability management mistakes to protect critical IT assets and improve your security posture, while reducing costs. Read this paper to learn more.
Posted: 10 Jul 2010 | Published: 09 Jul 2010

eEye Digital Security

Virus Bulletin: Comparative Reviews in 2010
sponsored by ESET
WHITE PAPER: This paper shows you the latest news about the VB100 testing, Linux Enterprise Server 11, Windows XP SP3, Windows Server 2008 R2 and so much more.
Posted: 16 Jun 2010 | Published: 16 Jun 2010

ESET

ForwardView: Four Areas of Security Vital to Business Health
sponsored by IBM
WHITE PAPER: Identifying areas of vulnerability can be increasingly challenging for small to mid-size businesses, but there are four areas – privacy, compliance, risk management and overall security capabilities – where information security is vital to business and profitability.
Posted: 15 Jun 2010 | Published: 08 Nov 2008

IBM

The Industrialization of Hacking
sponsored by Imperva
WHITE PAPER: The industrialization of hacking coincides with a critical shift in what's considered today's prized commodity: data. Read this paper to find out more.
Posted: 02 Jun 2010 | Published: 02 Jun 2010

Imperva

Protecting Your Applications from Backdoors: How Static Binary Analysis Helps Build High-Assurance Applications
sponsored by Veracode, Inc.
WHITE PAPER: Backdoors pose operational risk to software that is too significant for organizations to ignore. Binary-level application testing (also called compiled-code analysis) makes it possible to examine the entire application in its final “as delivered” form. Read this white paper to learn more about protecting applications from backdoor vulnerabilities.
Posted: 10 May 2010 | Published: 10 May 2010

Veracode, Inc.

Successfully Mitigating Corporate Risk
sponsored by AT&T Corp
WHITE PAPER: This paper discusses how to help reduce risk and successfully manage your security infrastructure through conducting vulnerability assessments, using discovery tools, adopting centralized policy setting and event correlation, and taking a cohesive approach to updating network equipment.
Posted: 06 Apr 2010 | Published: 05 Apr 2010

AT&T Corp

BeyondTrust 2009 Microsoft Vulnerability Analysis
sponsored by BeyondTrust Corporation
WHITE PAPER: This report demonstrates the critical role that restricting administrator rights plays in protecting against vulnerabilities. It is important to note that this increased protection is achievable in one simple step without any impact on productivity — by implementing a desktop Privilege Identity Management solution.
Posted: 05 Apr 2010 | Published: 01 Apr 2010

BeyondTrust Corporation

Four Steps to Cure Your Patch Management Headache
sponsored by Lumension
WHITE PAPER: Using patch and vulnerability management as the principal component of your risk mitigation strategy and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term.
Posted: 11 Feb 2010 | Published: 11 Feb 2010

Lumension

2010: Cybercrime Coming of Age
sponsored by ESET
WHITE PAPER: In this paper you'll read that cybercrime is on the rise, not only in terms of the number of perpetrators and the volume of crimes committed, but also in terms of the range of techniques employed to carry them out.
Posted: 02 Feb 2010 | Published: 01 Jan 2010

ESET

Considerations for Integrating Intelligence into Security Operations
sponsored by VeriSign EMEA
WHITE PAPER: This whitepaper outlines four critical elements of cyber security intelligence that organizations must meet to ensure that the integration of the intelligence will help improve the safety and profitability of enterprises. This paper also presents specific questions to ask when determining the best approach for an overall risk-mitigation strategy.
Posted: 23 Dec 2009 | Published: 03 Dec 2009

VeriSign EMEA

Understanding Why Web Application Security is Critical to Business
sponsored by Sirius Computer Solutions
WHITE PAPER: This paper compiles clients’ frequently asked questions about Web application security. These questions are answered by security experts from Sirius and IBM. The goal is to help you understand the issues surrounding Web application security; so you can better prepare your organization for a security breach.
Posted: 13 Oct 2009 | Published: 01 Sep 2009

Sirius Computer Solutions

Realizing Asset-Centric and User-Centric Approaches to Security
sponsored by RES Software
WHITE PAPER: This white paper presents an overview of both the asset-centric and the user-centric approaches to security. These approaches will be mapped towards the standard for Information Security: ISO 17799.
Posted: 18 Sep 2009 | Published: 18 Sep 2009

RES Software

10 Common Pitfalls to Avoid When Evaluating Security Information Management (SIM) Solutions
sponsored by netForensics
WHITE PAPER: This paper was created to help companies searching for a SIM solution narrow their options and determine which technology is the right one for their IT environment and security objectives.
Posted: 10 Sep 2009 | Published: 10 Sep 2009

netForensics

Healthcare Data Loss Assessment: Measure sensitive patient data loss on your network
sponsored by Code Green Networks, Inc.
WHITE PAPER: Loss of patient data is a top concern for any healthcare organization. They handle some of the most sensitive and personal data on the individuals they treat. Patients trust healthcare organizations to safeguard sensitive data. Read this whitepaper to find more about how a data loss prevention (DLP) solution can protect patient data.
Posted: 09 Sep 2009 | Published: 09 Sep 2009

Code Green Networks, Inc.

Unraveling Web Malware
sponsored by FireEye
WHITE PAPER: There has been a rapid rise in the use of web blended threats. Defending corporate networks from these threats requires modern protection that functions on many levels. Find out how cyber criminals infiltrate your network and how FireEye's blended defense against Web malware prevents data loss and intellectual property theft.
Posted: 01 Sep 2009 | Published: 29 Sep 2008

FireEye
101 - 125 of 168 Matches Previous Page    3 4 5 6 7    Next Page
 
VULNERABILITY ASSESSMENTS DEFINITION (continued): …  how well they work after theyare put into use.A vulnerability scanner relies on a database that contains allthe information required to check a system for security holes inservices and ports, anomalies in packet construction, and potentialpaths to exploitable programs or scripts. Then the scanner tries toexploit each vulnerability that is discovered. This process issometimes called ethical hacking.An ideal vulnerability scanner has capabilities such as the following: Maintenance of an up-to-date database of vulnerabilities. Detection of genuine vulnerabilities without an excessive number of … 
Vulnerability Assessments definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement