IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management White Papers (View All Report Types)
1 - 25 of 479 Matches Previous Page  |  Next Page
Why Activity Monitoring Should Supplement Log Management
sponsored by BalaBit
WHITE PAPER: In this white paper, discover how you can fill in your log management gaps by monitoring privileged users.
Posted: 24 Apr 2015 | Published: 24 Apr 2015

BalaBit

Top 10 Reasons to Monitor Privileged Users
sponsored by BalaBit
WHITE PAPER: In this infographic, discover what IT pros really think about privileged activity monitoring, including stats on common security postures, the top ten reasons to adopt privileged identity monitoring, and more.
Posted: 23 Apr 2015 | Published: 23 Apr 2015

BalaBit

Control Your IT Staff
sponsored by BalaBit
WHITE PAPER: In this white paper, discover how privileged activity monitoring can easily collect data about what your privileged users are doing.
Posted: 23 Apr 2015 | Published: 23 Apr 2015

BalaBit

Beginner's Guide to SSL Certificates
sponsored by Symantec
WHITE PAPER: The key to web security is SSL, and this white paper can help you understand exactly what SSL is and how it works.
Posted: 23 Apr 2015 | Published: 31 Oct 2013

Symantec

New Encryption Algorithm Put to the Test
sponsored by Symantec
WHITE PAPER: This white paper presents the results of several research tests performed on elliptic curve cryptography (ECC), a new and promising SSL/TSL encryption algorithm.
Posted: 23 Apr 2015 | Published: 31 Dec 2013

Symantec

Integrating App Security into the Development Lifecycle
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores how to combat cybercriminals by integrating security into the software development lifecycle and offers strategies and best practices to ensure success.
Posted: 23 Apr 2015 | Published: 14 Jan 2015

Hewlett-Packard Company

How a Security Operations Center Can Better Safeguard Your Business
sponsored by IBM
WHITE PAPER: This white paper suggests a new, innovative strategy for building security operations centers (SOCs) that streamline your security by focusing all security operations one central place.
Posted: 22 Apr 2015 | Published: 31 Dec 2013

IBM

Website Security for Dummies
sponsored by Symantec
WHITE PAPER: In this free e-book, find clear, straightforward guidelines for ensuring airtight website security.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

Symantec

Not All Certificate Authorities Are Created Equal
sponsored by Symantec
WHITE PAPER: Making the right CA choice can ensure your online security. In this white paper, discover what a secure CA looks like.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

Symantec

How You Can Protect Your Organization from Advanced Attacks
sponsored by IBM
WHITE PAPER: This white paper introduces a strategy that can reduce the rate of APTs and targeted attacks, and that can help you mitigate them when they do occur.
Posted: 21 Apr 2015 | Published: 31 Mar 2015

IBM

Market Study: 7 Security Forensics Platforms
sponsored by IBM
WHITE PAPER: In this research report, find detailed reviews and ratings for seven leading security forensics platforms.
Posted: 21 Apr 2015 | Published: 31 Jul 2014

IBM

Research Reveals How Twelve MSS Options Perform
sponsored by IBM
WHITE PAPER: In this research report, discover how twelve MSS vendors measured up when tested.
Posted: 21 Apr 2015 | Published: 26 Feb 2014

IBM

The Essential Guide to Privileged Activity Monitoring
sponsored by BalaBit
WHITE PAPER: In it, learn how privileged activity monitoring can help you control your IT environment without compromising user productivity.
Posted: 20 Apr 2015 | Published: 20 Apr 2015

BalaBit

Narrowing The Security Gap With Automated Configuration Assessment
sponsored by Qualys
WHITE PAPER: This white paper outlines the three best practices to controlling incorrect app configurations and how to minimize risks.
Posted: 20 Apr 2015 | Published: 28 Jan 2015

Qualys

Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: Access this white paper to explore how to improve visibility into who has access to what as well as policies and controls.
Posted: 17 Apr 2015 | Published: 09 Apr 2014

IBM

The State of Mobile Application Insecurity
sponsored by IBM
WHITE PAPER: This white paper examines why mobile app security eludes many organizations and offers steps to strengthen your security policies and minimize vulnerabilities. Read on to learn more.
Posted: 17 Apr 2015 | Published: 25 Feb 2015

IBM

Quarterly Cyberthreat Report
sponsored by IBM
WHITE PAPER: In this quarterly security report, discover what lessons have been learned in 2014 and how cybersecurity needs to evolve in 2015.
Posted: 17 Apr 2015 | Published: 31 Mar 2015

IBM

Confident and Careful: The Security Benefits of the Cloud
sponsored by IBM
WHITE PAPER: In this infographic, discover why cloud security services could be the answer to your organization's needs.
Posted: 17 Apr 2015 | Published: 31 Dec 2014

IBM

Securing Apps from the First Line of Code
sponsored by White Hat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 16 Apr 2015 | Published: 28 Oct 2014

White Hat Security

Time for Legal and Compliance Staff to Tune in to Cyber Risk Management
sponsored by UnitedLex
WHITE PAPER: Access this white paper to learn why a unified or converged approach to threat management is necessary to effectively fight cyber attackers and prevent costly data breaches.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

UnitedLex

Active Visibility for Multi-Tiered Security
sponsored by Gigamon
WHITE PAPER: Access this white paper to learn how a multi-tiered security strategy can help you effectively deploy the security tools at your disposal.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Gigamon

Fending Off the Known and Unknown - Runtime Application Security
sponsored by Prevoty
WHITE PAPER: In this white paper, explore how to monitor and protect applications at runtime and neutralize known vulnerabilities as well as zero day attacks through app self-defense.
Posted: 14 Apr 2015 | Published: 01 Apr 2015

Prevoty

Cybersecurity Strategies for the Midsize Businesses
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper examines the steps and technologies security managers for small- to mid-size organizations can leverage at each stage of an attack - before, during and after - in order to effectively secure endpoints and crucial data effectively.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Cisco Systems, Inc.

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this white paper to learn about another perspective in POS system security. Read on for an overview of payment card systems and attack methods, as well as how to leverage the Council on CyberSecurity's 20 critical controls to your system's advantage.
Posted: 13 Apr 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

Enterprise Security Must Move Beyond Building Protective Walls
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper outlines and explores the six steps of the Attack Life Cycle and takes you into the minds of hackers and cybercriminal teams to help you better craft your security strategy. Read on now to learn how to allocate resources so defenses are most appropriate to the risks.
Posted: 13 Apr 2015 | Published: 08 Apr 2015

Hewlett-Packard Company
1 - 25 of 479 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement