IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability ManagementWhite Papers (View All Report Types)
26 - 50 of 390 Matches Previous Page  | Next Page
10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: Data collection plays a huge role in today's security landscape, and this guide explores 10 ways that you can achieve effective security by utilizing big data analytics.
Posted: 19 Aug 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

Security Intelligence for a Faster World
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource explores how a new security information and event management (SIEM) system provides the unparalleled protection your organization needs to face the risks of big data.
Posted: 19 Aug 2014 | Published: 31 May 2012

Hewlett-Packard Company

The Importance of Reputation
sponsored by Hewlett-Packard Company
WHITE PAPER: This guide explores the inexplicable link between data and security, and lays out the current threat landscape in today's ever-changing IT world.
Posted: 19 Aug 2014 | Published: 31 Dec 2013

Hewlett-Packard Company

The 2014 Next Generation Firewall Challenge
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource helps you understand the next generation firewall (NGFW), and how to choose the best solution to combat today's threats.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Hewlett-Packard Company

Ushering in a New Era in Mobile Data Security
sponsored by Bluebox
WHITE PAPER: In this informative white paper, discover a new mobile security platform that balances effective protection, data visibility, and app accessibility and freedom for the user.
Posted: 18 Aug 2014 | Published: 20 Aug 2014

Bluebox

Advanced Persistent Threats: Expert Strategies for IT Security
sponsored by IBM
WHITE PAPER: This expert E-Guide outlines the best practices for organizations to defend themselves against these malicious attacks and to prevent them before they happen.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

IBM

Research Report: Mobile Security Trends in the Workplace
sponsored by Bluebox
WHITE PAPER: In this informative report, get the facts on enterprise mobility trends and BYOD programs, and discover how organizations should adapt to this changing IT security landscape.
Posted: 15 Aug 2014 | Published: 30 Jun 2014

Bluebox

Prevent Data Leakage and Keep Business Users Happy
sponsored by BlackBerry
WHITE PAPER: This white paper explains how mobile device containerization technologies vary on a wide scale, and can significantly impact the effectiveness of enterprise mobility management (EMM).
Posted: 13 Aug 2014 | Published: 25 Jul 2014

BlackBerry

9 Ways to Secure Your Store Systems and Ensure PCI Compliance
sponsored by Bit9 + Carbon Black
WHITE PAPER: Discover nine strategies to consider when looking to take control of your security and reduce the burden of achieving and maintaining PCI compliance.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

Bit9 + Carbon Black

Security Threat Report 2014
sponsored by Sophos, Inc.
WHITE PAPER: In this security threat report, explore how malware has evolved and botnet and exploit kit innovations have proliferated. Read on to learn how a hacker can profit from your smartphone, tips for protecting your web server and clients, how to protect from targeted threats to your financial accounts, and more.
Posted: 11 Aug 2014 | Published: 31 Dec 2013

Sophos, Inc.

Vulnerability Assessment and Penetration Testing: Can You Afford Not To?
sponsored by Pwine Express
WHITE PAPER: This informative white paper explains why vulnerability assessment and penetration testing are such critical tools in the fight against modern cybercrime, as well as how they can make a difference in your organization's security solution.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

Pwine Express

Use Case: Secure Internet Access for 71,000 Australian Students
sponsored by Websense, Inc.
WHITE PAPER: This white paper describes a use case involving an Australian educational in need of a centralized, scalable solution in order to distribute materials to 45,000 users per day in safe, easily accessible manner.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Websense, Inc.

Diversionary and Multivector DDoS Attacks
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this essential white paper, you'll learn about the rise of these destructive attacks, why they are so difficult to block, and how an integrated security solution could help keep your organization protected.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Juniper Networks, Inc.

The New Breed of DDoS Attacks: An Executive Brief
sponsored by Juniper Networks, Inc.
WHITE PAPER: This informative resource breaks down the new breed of DDoS attacks, and provides strategies for keeping your organization protected.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Juniper Networks, Inc.

Use Case: Scaling a University's Intrusion Detection System to Support 30,000 Users
sponsored by Gigamon
WHITE PAPER: This white paper explores a use case in which a major research university needed to upgrade its intrusion detection system (IDS) to secure 30,000 users and monitor tens of gigabits of internet traffic each second.
Posted: 07 Aug 2014 | Published: 30 Jun 2014

Gigamon

Cybersecurity’s Maginot Line: A Real-World Assessment Of The Defense-In-Depth Model
sponsored by FireEye
WHITE PAPER: This essential white paper outlines how organizations can update their security solutions for the modern age by reducing waste on redundant, backward-looking technology, and refocusing on defenses designed to stop today's cyber attacks.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

FireEye

The Heartbleed Bug: How To Protect Your Business
sponsored by Symantec Corporation
WHITE PAPER: In this in-depth white paper, learn how new security platforms can protect your data against Heartbleed and any future attacks with advanced tools like two-factor authentication.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

Symantec Corporation

Implement a Risk Management Platform to Dodge Vulnerabilities
sponsored by BeyondTrust Corporation
WHITE PAPER: This resource introduces a collaborative approach to IT risk management by integrating two security methodologies: privileged account management and vulnerability management.
Posted: 05 Aug 2014 | Published: 30 Jan 2014

BeyondTrust Corporation

Reducing the Cost and Complexity of Web Vulnerability Management
sponsored by Symantec
WHITE PAPER: This white paper investigates how to reduce the cost and complexity of Web vulnerability management with a managed approach for detection.
Posted: 05 Aug 2014 | Published: 31 Dec 2012

Symantec

The Key to Protecting your Website is Knowledge
sponsored by Symantec
WHITE PAPER: Learn how vulnerabilities can seriously affect your organisation if the proper steps aren't taken towards protection.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Symantec

Closing PCI DSS Security Gaps with Proactive Endpoint Monitoring and Protection
sponsored by Bit9 + Carbon Black
WHITE PAPER: This resource discusses compliance issues and security gaps, explains how these can affect your organization, and how implementing a positive security solution can close the gaps.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Bit9 + Carbon Black

Cisco 2014 Midyear Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: As the Internet of Things accelerates, adversaries will spend even more time finding weak links across the threat landscape and using them to their advantage to compromise systems and data. Download this white paper to learn about these threats as well as industry-specific risks.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Cisco Systems, Inc.

There's Good Security and Then There's National Security
sponsored by BlackBerry
WHITE PAPER: Access this white paper to learn about BlackBerry's top-tier line of defense, creating the ultimate end-to-end mobile security solution.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

BlackBerry

Privileged Account Security: Protect Your Data without Sacrificing Efficiency
sponsored by BeyondTrust Corporation
WHITE PAPER: Read this white paper to learn how new security solutions can help your business manage privileged account security without sacrificing efficiency.
Posted: 01 Aug 2014 | Published: 28 Feb 2014

BeyondTrust Corporation

Context-Aware Vulnerability Management: The Basics
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines the benefits of context-aware vulnerability management solutions, and if it is the right security solution for your organization.
Posted: 01 Aug 2014 | Published: 31 Jan 2014

BeyondTrust Corporation
26 - 50 of 390 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement