IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management White Papers (View All Report Types)
1 - 25 of 350 Matches Previous Page  |  Next Page
Tackling Workplace Mobility
sponsored by VMware
WHITE PAPER: 84% of employees use a mobile device during their work day. As mobility takes over the workplace, problems with security, compliance, and cost begin to pop up. Learn more about the mobile takeover and find a solution that tackles these challenges.
Posted: 18 May 2016 | Published: 29 Apr 2016

VMware

Protecting Threats in a Small Business Environment
sponsored by CDW
WHITE PAPER: Access this white paper for insights on how small businesses can more efficiently handle their security infrastructure. Even without an extensive IT staff, small businesses can deploy a robust, easy-to-manage security platform protecting your data and your reputation.
Posted: 13 May 2016 | Published: 01 Apr 2016

CDW

3 Major Challenges to Securing Your Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: Get an overview of cloud strategies to help you address three major security challenges and protect your data as your organization evolves into a cloud-enabled enterprise.
Posted: 10 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.

Network Testing Types to Ensure Top Performance, ROI and Security
sponsored by Ixia
WHITE PAPER: Testing is a crucial part of the lifecycle of networks, products, and services across technology as change becomes more rapid and complexity increases. Testing not only helps project meet or exceed expectations, but also improves ROI and security. Learn about the 5 types of testing and where to focus against each area for maximum performance.
Posted: 04 May 2016 | Published: 01 Mar 2016

Ixia

The Executive's Guide to the 2016 Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This white paper offers insights on the latest security threats and offers best practices for protecting your organization from cybersecurity attacks as they grow in sophistication. Access now to receive comprehensive data from 24 security ops centers that'll provide you with a highly accurate representation of the global threat landscape.
Posted: 03 May 2016 | Published: 01 Apr 2016

Dimension Data

Protect your Organization Against Cybercrime in the Digital Era
sponsored by Dimension Data
WHITE PAPER: This white paper shows you statistics about the past year's detected cyberattacks and gives you insight on how to protect your organization against cybercrime in today's hostile environment. Access immediately to learn where your vulnerabilities may lay and how to best protect yourself against sophisticated threats.
Posted: 03 May 2016 | Published: 01 Apr 2016

Dimension Data

Taking Container Security to the Next Level Final
sponsored by Black Duck Software
WHITE PAPER: This white paper explores the security concerns around container use and details how you can enact measures to mitigate the dangers. Access now and learn how you can protect code integrity when containers are in use and safely utilize open source code in general.
Posted: 03 May 2016 | Published: 01 Apr 2016

Black Duck Software

SCIENCELOGIC: Unmatched Visibility into Open Source
sponsored by Black Duck Software
WHITE PAPER: This white paper takes you through ScienceLogic's struggles to gain better visibility into their open source software. See how ScienceLogic was able to improve efficiency and, most importantly, security by reviewing their code before their products hit the market so they knew exactly what to change.
Posted: 03 May 2016 | Published: 01 Apr 2016

Black Duck Software

IBM Security Guardium Vulnerability Assessment
sponsored by IBM
WHITE PAPER: Discover how to harden your data infrastructure by scanning targeted systems on a scheduled basis to detect vulnerabilities. Learn to identify exploitable security holes in your database and enforce best practices with tests and customizable options for each data type.
Posted: 26 Apr 2016 | Published: 01 Apr 2016

IBM

5 Security Controls for an Effective Security Operations Center (SOC)
sponsored by AlienVault
WHITE PAPER: Whether you're part of a security team or a one-man show, this guide will teach you what data your SOC needs to operate effectively and what methods and tools you can use to gather that data. Download this guide now to accelerate your evaluation of SOC tools and technology needs.
Posted: 01 Apr 2016 | Published: 23 Mar 2016

AlienVault

2016 Cyberthreat Defense Report
sponsored by Imperva
WHITE PAPER: You will learn how your spend compares to that of other organizations, what defense measures your peers have in place to defend against internal and external threats, and why weaknesses in your strategy could make your organization a "low hanging fruit".
Posted: 14 Mar 2016 | Published: 24 Feb 2016

Imperva

2016 Cyberthreat Defense Report
sponsored by LogRhythm, Inc.
WHITE PAPER: This 36-page report reveals the results from 1,000 IT security pros primary concerns about existing cybersecurity threats, defense strategies, and whether investing more in IT improves your chances of securing your organization against these threats.
Posted: 07 Mar 2016 | Published: 02 Mar 2016

LogRhythm, Inc.

PCI Compliance Protect your business from data breach
sponsored by Earthlink.
WHITE PAPER: Get stronger control over PCI compliance in this white paper by learning the 12 requirements to simplify and accelerate the process. Access this resource now to learn how to proactively protect your organization from a data breach.
Posted: 01 Mar 2016 | Published: 01 Mar 2016

Earthlink.

Oracle database licensing challenges
sponsored by Matrix42
WHITE PAPER: This white paper shows you three examples businesses whose licensing agreements with Oracle fell short of expectations. Learn some of the shortcomings these businesses experienced to protect yourself from similar involvement.
Posted: 29 Feb 2016 | Published: 27 Jan 2016

Matrix42

3 Steps to Implementing an Effective BYOD Mobile Security Strategy
sponsored by Checkpoint Software Technologies
WHITE PAPER: This white paper identifies three key steps that help to secure your mobility in a way that maximizes its benefits. Download now to get access to a checklist of capabilities you can use when evaluating mobile security solutions to ensure you can get the most out of your mobility initiatives.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Checkpoint Software Technologies

Exposing the Unknown: How Sandboxing Technology Fights Modern Threats
sponsored by Checkpoint Software Technologies
WHITE PAPER: This white paper takes a look at the modern threat landscape, including zero-day attacks and advanced persistent threats (APT), and the consequences of not protecting your company's data and networks. Access now to learn how traditional sandboxing compares to advanced sandbox solutions.
Posted: 11 Feb 2016 | Published: 30 Jun 2015

Checkpoint Software Technologies

Using Veeam and VMware vSphere Tags for Advanced Policy-driven Data Protection
sponsored by Veeam Software
WHITE PAPER: This white paper defines activities that will protect workloads based on the “desired state” that their users will define for their workloads.
Posted: 11 Feb 2016 | Published: 31 Dec 2015

Veeam Software

Intelligent Spear Phishing Protection: Stopping Highly Targeted Attacks
sponsored by Cloudmark
WHITE PAPER: In this brief paper, discover how today's spear phishing attacks operate, as well as how they evade conventional defenses. Learn how to employ protection against these highly targeted attacks with next-gen context analysis and real-time reporting dashboards.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

Cloudmark

Protecting Your Data in a New Generation Virtual and Physical Environment
sponsored by Acronis
WHITE PAPER: Read this white paper to learn how you can easily and safely protect your data in a new generation virtual and physical IT environment, eliminate single point of failure, and the need for multiple backup solutions.
Posted: 25 Jan 2016 | Published: 15 Oct 2014

Acronis

Success That Scales: Delivering Security Intelligence for Organizations of All Sizes
sponsored by IBM
WHITE PAPER: This white paper explains how an integrated security intelligence platform with scalable capabilities, allowing enterprises to stay a step ahead of security threats. Read on to learn how this platform can enable you to scale out and up and deploy new capabilities such as integrated risk management, vulnerability management, and incident forensics.
Posted: 22 Jan 2016 | Published: 31 Oct 2014

IBM

The Trust Cost of a Data Breach & How to Prepare
sponsored by AllClear ID
WHITE PAPER: This report summarizes findings for a sampling of 160 data breach insurance claims, 155 of which involved the exposure of sensitive personal data in a variety of business sectors. The objective for this study is to you understand the true impact of data insecurity.
Posted: 20 Jan 2016 | Published: 16 Dec 2015

AllClear ID

Cyber Security Intelligence Index for Retail
sponsored by IBM
WHITE PAPER: This security intelligence report examines the types of threats that retailers face and gives advice for staying safe. Access it now to learn how you can protect your retail organization from advanced attacks.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

IBM

Vulnerability Response Best Practices
sponsored by Alert Logic
WHITE PAPER: This white paper gives you a step-by-step approach in responding to vulnerabilities with examples of breaches throughout. Learn how to prepare you network for an attack and how to lessen the potential for security flaws in your network.
Posted: 23 Feb 2016 | Published: 31 Dec 2015

Alert Logic

Secure Your Cloud Against Exposures: How Vulnerability Management Platforms Help
sponsored by Alert Logic
WHITE PAPER: This commissioned study, conducted by Forrester Research on behalf of Alert Logic, examines how vulnerability management platforms actively/continuously scan apps and data in public cloud environments to beyond current security technologies. Read on to review how to close visibility gaps in your cloud security model.
Posted: 11 Feb 2016 | Published: 27 Jan 2016

Alert Logic

Cybercrime Exposed: The Hidden Economy of Cybercrime-as-a-Service
sponsored by Intel
WHITE PAPER: Access this resource for an inside look at the thriving economy of "cybercrime-as-a-service."
Posted: 07 Jan 2016 | Published: 31 Dec 2013

Intel
1 - 25 of 350 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement