IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management White Papers (View All Report Types)
1 - 25 of 418 Matches Previous Page  |  Next Page
Managing Jailbreak Threats on iOS
sponsored by Lookout
WHITE PAPER: Download this white paper to learn about the prevalence of jailbroken iOS devices and how to protect against jailbroken device risks.
Posted: 25 Aug 2015 | Published: 24 Jun 2015

Lookout

Protect Your Business Critical Apps from Compromise
sponsored by Onapsis
WHITE PAPER: This white paper describes how, with technologies ranging from vulnerability management to advanced threat protection, you can make sure your SAP applications stay secure.
Posted: 18 Aug 2015 | Published: 31 May 2015

Onapsis

A Simple Guide to Successful Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This white paper discusses the importance of penetration testing and presents six steps to doing it effectively.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Core Security Technologies

Managing Threats and Remediating Risk for State of Vermont Applications
sponsored by Core Security Technologies
WHITE PAPER: In this case study, the Vermont state government struggles to detect and mitigate all vulnerabilities in the applications that handle its sensitive data.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Core Security Technologies

Keeping Your Data Safe: Protecting Corporate Information in the Cloud
sponsored by Symantec Corporation
WHITE PAPER: This white paper explores the challenges of securing data in the cloud. Continue reading to explore the strategies that have worked for other organizations; the issues presented by human error; and more.
Posted: 14 Aug 2015 | Published: 05 Aug 2015

Symantec Corporation

The State of Mobile Application Insecurity
sponsored by IBM
WHITE PAPER: This white paper examines why mobile app security eludes many organizations and offers steps to strengthen your security policies and minimize vulnerabilities. Read on to learn more.
Posted: 13 Aug 2015 | Published: 25 Feb 2015

IBM

Best Practices for Threat & Vulnerability Management
sponsored by Core Security Technologies
WHITE PAPER: This white paper discusses what you can do to adapt your vulnerability management to the modern threat landscape.
Posted: 13 Aug 2015 | Published: 13 Aug 2015

Core Security Technologies

Securing Information in the New Digital Economy
sponsored by Oracle Corporation
WHITE PAPER: This white paper teaches you how to build more effective security by focusing your attention on internal vulnerabilities.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Oracle Corporation

Web Security Threat Report 2015
sponsored by Symantec
WHITE PAPER: By using data from the most comprehensive global intelligence network in the world, this resource provides a breakdown of each type of cyber-attack and how you can prevent it.
Posted: 28 Jul 2015 | Published: 28 Jul 2015

Symantec

Understanding Valdation: Understanding the Art and Science of SSL Certificate Validation
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paper acts as a buyer's guide to choosing the right level of SSL certificate validation for your organization.
Posted: 16 Jul 2015 | Published: 15 Jan 2014

GeoTrust, Inc.

Five Steps to Achieve Risk-Based Application Security Management
sponsored by IBM
WHITE PAPER: This expert white paper discusses the potential obstacles to effectively managing application security and presents a 5-step process for improving app security management.
Posted: 15 Jul 2015 | Published: 08 Jul 2015

IBM

Mobile Malware: The Hackers' New Playground
sponsored by IBM
WHITE PAPER: This comprehensive white paper outlines how to prevent security breaches in mobile apps. Read on to learn about the intricacies of mobile malware, mobile threat management, how iOS is still vulnerable to attacks, and much more.
Posted: 13 Jul 2015 | Published: 13 Jul 2015

IBM

The Top 10 TLS/SSL Client, Server, and Application Best Practices
sponsored by Symantec Corporation
WHITE PAPER: This whitepaper provides an in-depth breakdown of the top 10 TLS/SSL client, server and application best practices.
Posted: 08 Jul 2015 | Published: 08 Jul 2015

Symantec Corporation

Website Security Threat Report Part 3
sponsored by Symantec Corporation
WHITE PAPER: Download part 3 of this Website Security Threat Report to discover how the public made criminal's lives easier in falling for the latest social media attacks and online scams. Plus, take an invaluable look ahead and benefit from our security recommendations and best practices.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Website Security Threat Report Part 2
sponsored by Symantec Corporation
WHITE PAPER: Download part 2 of this Website Security Threat Report for the latest on the fast-evolving world of targeted attacks - from cyber espionage tactics to denial of service, spear-phishing and watering hole attacks.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Website Security Threat Report Part 1
sponsored by Symantec Corporation
WHITE PAPER: This website security threat report will give enterprises, small businesses and consumers essential information to help secure their systems from threat vulnerabilities. Continue reading to access emerging trends in attacks, malicious code activity, phishing, and spam.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Data Protection for Higher Education
sponsored by Acronis
WHITE PAPER: Access this white paper to discover why it's important to protect institution data and the challenges that higher education institutions face with data protection.
Posted: 07 Jul 2015 | Published: 31 Mar 2015

Acronis

Bolster Your Web Application Security
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines how you can give your web applications the security they need, and protect against vulnerabilities or other threats.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

WhiteHat Security

Today's Top Mobile Security Challenges and Defense Strategies
sponsored by HID
WHITE PAPER: This white paper examines the top mobile security challenges IT is facing today and the most successful defense strategies being used to mitigate threats.
Posted: 26 Jun 2015 | Published: 05 May 2015

HID

Into the Breach: Lessons from Real Security Incidents
sponsored by Varonis
WHITE PAPER: This white paper outlines three devastating security breaches from start to finish, helping you to learn from the mistakes of these compromised businesses and to better keep yourself safe.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Varonis

15 SIEM Products Analyzed and Reviewed
sponsored by IBM
WHITE PAPER: This resource objectively evaluates fifteen SIEM technologies and provides you with a detailed report of each one.
Posted: 24 Jun 2015 | Published: 25 Jun 2014

IBM

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

An Introduction to AWS Security
sponsored by Global Knowledge
WHITE PAPER: This white paper explains the most important aspects of AWS security and what that means to the enterprise.
Posted: 17 Jun 2015 | Published: 05 May 2015

Global Knowledge

The Essential Guide To Selling Managed Endpoint Protection
sponsored by Solarwinds N-able
WHITE PAPER: This guide offers essential tips for building managed security services that effectively protect your customers while building your revenue.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

Solarwinds N-able

Why Patch Management Matters
sponsored by Solarwinds N-able
WHITE PAPER: This white paper explains why an effective MSP needs to offer patch management services and suggests best practices for doing so.
Posted: 02 Jun 2015 | Published: 02 Jun 2015

Solarwinds N-able
1 - 25 of 418 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement