IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management White Papers (View All Report Types)
26 - 50 of 434 Matches Previous Page  |  Next Page
Predictions from the Front Lines for Cybersecurity in 2015
sponsored by Threat Track Security
WHITE PAPER: This white paper summarizes the results of a survey of security professionals, revealing what IT professionals are thinking and why in 2015.
Posted: 18 Feb 2015 | Published: 18 Feb 2015

Threat Track Security

The Security Value of a Dozen Next Generation Firewalls
sponsored by Cisco Systems, Inc.
WHITE PAPER: A security research group has put together an info-graphic that summarizes the results of independent studies on a dozen different NGFW products.
Posted: 18 Feb 2015 | Published: 30 Sep 2014

Cisco Systems, Inc.

Discover the Capabilities of a Next Generation Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: This in-depth white paper provides a close look at a next generation firewall, describing each of its capabilities in detail.
Posted: 18 Feb 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

A Detailed Report on a Strong and Effective Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: This detailed white paper gives you all the detail you need on a firewall that's stable, reliable, and able to block over 99% of threats.
Posted: 17 Feb 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

One Great Firewall Analyzed in Depth
sponsored by Cisco Systems, Inc.
WHITE PAPER: This detailed white paper gives you all the information you need about a firewall that's stable, reliable, and able to block over 99% of threats.
Posted: 17 Feb 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Cisco 2015 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This report reveals up-to-date data on many of the most important security concerns facing organizations in 2015.
Posted: 16 Feb 2015 | Published: 01 Jan 2015

Cisco Systems, Inc.

4 Data Traffic Security Challenges Exposing Enterprises to Hack Attacks
sponsored by Certes Networks
WHITE PAPER: This white paper discusses the 4 major points of weakness that your enterprise needs to prioritize in 2015 in order to defend your business-critical data from hackers.
Posted: 12 Feb 2015 | Published: 22 Jan 2015

Certes Networks

Bridging the Data Security Gap: Unified Data Protection for 4 Key Data Environments
sponsored by IBM
WHITE PAPER: This white paper explores how to bridge the data security gap amid the digital information explosion in four major areas: Big data, virtual environments and the cloud, enterprise data, and enterprise applications.
Posted: 12 Feb 2015 | Published: 31 May 2013

IBM

Printers Can Do More than Ever – Including Invite Hacks
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores the key security risks presented by today's networked printer and offers an overview of some innovative solutions that address them.
Posted: 11 Feb 2015 | Published: 30 Sep 2014

Hewlett-Packard Company

The Executive Breach Blanket: 7 Steps to Safeguard Your Corporate Data
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper contains an effective 7-step process for ensuring that your business is ready to respond to data breaches.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Hewlett-Packard Company

Human Vulnerabilities in Our Current Threat Landscape
sponsored by Global Knowledge
WHITE PAPER: This white paper enables you to educate your employees on security best practices and current human vulnerabilities, helping you to ensure that you're not a part of the many organizations that are breached.
Posted: 10 Feb 2015 | Published: 31 Jan 2015

Global Knowledge

Securing the Enterprise in 2015: 5 pragmatic steps to security
sponsored by Dell SecureWorks
WHITE PAPER: This white paper outlines a 5-step plan for developing strong security no matter what security product is used.
Posted: 10 Feb 2015 | Published: 31 Jan 2015

Dell SecureWorks

How Multifunction Printers can Create Unexpected Risks
sponsored by Hewlett-Packard Company
WHITE PAPER: This analyst brief reveals the consequences of nonsecure MFPs, and offers essential guidance on how to secure them.
Posted: 10 Feb 2015 | Published: 31 Jul 2014

Hewlett-Packard Company

How to Protect Sensitive Retail Data
sponsored by IBM
WHITE PAPER: This white paper goes into detail about the threats facing retail enterprises and how to mitigate them.
Posted: 09 Feb 2015 | Published: 30 Nov 2014

IBM

It's Not All Black & White: A Practical Method for Blacklisting & Whitelisting
sponsored by Viewfinity
WHITE PAPER: This brief white paper gives a suggestion for how to streamline the whitelisting and blacklisting process, including what to do with the multitude of programs in a gray area between blacklists and whitelists.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Viewfinity

Mitigating the Biggest Security Threat of all – Your Users
sponsored by Viewfinity
WHITE PAPER: This white paper describes one method of giving users the admin rights they need while still mitigating the risks they pose.
Posted: 09 Feb 2015 | Published: 01 Feb 2012

Viewfinity

Latest Application Security Trends
sponsored by Qualys
WHITE PAPER: A survey was recently conducted to gather data on how organizations approach application security. The results reveal the most up-to-date data on application security trends.
Posted: 06 Feb 2015 | Published: 28 Feb 2014

Qualys

Recognizing Five Sources of High-Profile Data Security Breaches
sponsored by Mimecast
WHITE PAPER: This white paper discusses the 5 major categories of vulnerabilities that IT and security professionals need to account for in their solutions planning.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

Mimecast

New Threats for Healthcare Cybersecurity
sponsored by Qualys
WHITE PAPER: The following report summarizes the results from a survey of IT professionals working in healthcare organizations.Findings include what types of data are most at risk and the top threats to a healthcare organization's security.
Posted: 06 Feb 2015 | Published: 31 Dec 2014

Qualys

The Effectiveness of a SIEM System According to IT Professionals
sponsored by IBM
WHITE PAPER: The following document profiles how IT professionals rate one possible SIEM solution.
Posted: 05 Feb 2015 | Published: 28 Feb 2014

IBM

Critical Security Controls: From Adoption to Implementation
sponsored by Qualys
WHITE PAPER: This white paper reveals the results of a survey on CSC implementation, including the barriers businesses face and suggestions for overcoming them.
Posted: 04 Feb 2015 | Published: 30 Sep 2014

Qualys

Continuous Monitoring - A New Blueprint for Achieving Continuous Security & Compliance
sponsored by Qualys
WHITE PAPER: This white paper describes the benefits of continuous monitoring in providing efficient and immediate protection against threats.
Posted: 04 Feb 2015 | Published: 31 Aug 2014

Qualys

Few Businesses Feel Fully Prepared for Software Security Risks
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper reveals the results of a recent survey that explored enterprises' confidence in the security of the software that runs their businesses.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Hewlett-Packard Company

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Streamlining Multifunction Printer Security
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper describes an example of how you can efficiently enhance your MFP security with centralized and automated security settings.
Posted: 11 Feb 2015 | Published: 31 Mar 2013

Hewlett-Packard Company
26 - 50 of 434 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement