IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management White Papers (View All Report Types)
26 - 50 of 394 Matches Previous Page  |  Next Page
Keep Yourself Secure from Growing Cyber-Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this infographic, discover what you can do to stay safe in an increasingly dangerous cyber landscape, including increasing proactivity in your security strategy and partnering with security services.
Posted: 21 May 2015 | Published: 21 May 2015

Hewlett-Packard Limited

Advance the Fight against Cyber Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces the benefits of security services and gives you advice on how to best take advantage of them.
Posted: 21 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

Work Smarter, Not Harder, to Secure Your Applications
sponsored by Hewlett-Packard Company
WHITE PAPER: This paper features Maverick research from Gartner analyst, Joseph Feiman: Stop Protecting Your Apps: It's Time for Apps to Protect Themselves.
Posted: 18 May 2015 | Published: 01 May 2015

Hewlett-Packard Company

Top 10 Data Security Mistakes to Avoid
sponsored by EE
WHITE PAPER: This insightful white paper presents the top 10 common security mistakes that countless organizations have made recently.
Posted: 18 May 2015 | Published: 08 Apr 2015

EE

Protection from the Inside: Application Security Methodologies Compared
sponsored by Hewlett-Packard Company
WHITE PAPER: In this paper, the SANS Institute captures the relative capabilities and efficiencies of RASP and WAF technologies using a representative product in each category. Learn how your defense-in-depth strategy could benefit from the additional visibility of runtime protection.
Posted: 15 May 2015 | Published: 16 Apr 2015

Hewlett-Packard Company

Securing Cloud Computing: How to Evaluate Providers
sponsored by IntraLinks, Inc
WHITE PAPER: In this white paper, explore the state of security in the cloud. Continue reading to reveal a 21 questions-to-ask checklist of leading security practices for protecting sensitive data in the cloud.
Posted: 14 May 2015 | Published: 17 Dec 2014

IntraLinks, Inc

Fighting Today's Advanced Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper demystifies APTs and reveals a three phase strategy to defending your network against determined cybercriminals.
Posted: 13 May 2015 | Published: 22 Apr 2015

Fortinet, Inc.

An Inside View of a Zero-Day Campaign
sponsored by Malwarebytes Corporation
WHITE PAPER: This white paper follows one real-life zero-day attack, detailing how the attack entered the network, what parts of the network it infiltrated, and how it was eventually mitigated.
Posted: 06 May 2015 | Published: 06 May 2015


17 Security Products Tested for Malware Removal and Repair
sponsored by Malwarebytes Corporation
WHITE PAPER: This white paper presents the results of a series of independent tests on seventeen different anti-malware products.
Posted: 05 May 2015 | Published: 05 May 2015


How Anti-Exploit Software Stops Malware Early
sponsored by Malwarebytes Corporation
WHITE PAPER: This brief white paper explains the concept of anti-exploit technology and discusses its capabilities.
Posted: 05 May 2015 | Published: 05 May 2015


An Inside View of a Zero-Day Campaign
sponsored by Malwarebytes Corporation
WHITE PAPER: This article gets you inside the workings of a zero-day attack by giving you a step-by-step look at one that occurred just a few months ago.
Posted: 05 May 2015 | Published: 21 Apr 2015


Network Vulnerabilities Defended: Fighting Today’s Advanced Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper reveals the three phase strategy to defending your network against determined cybercriminals.  Read on to take a look into hackers' minds and learn how to improve data protection.
Posted: 04 May 2015 | Published: 22 Apr 2015

Fortinet, Inc.

Anti-Exploit Tools: The Next Wave of Enterprise Security
sponsored by Malwarebytes Corporation
WHITE PAPER: In this white paper, discover the shortcomings of traditional preventative security approaches and what you can do to move beyond them.
Posted: 01 May 2015 | Published: 01 May 2015


How a Security Operations Center Can Better Safeguard Your Business
sponsored by IBM
WHITE PAPER: This white paper suggests a new, innovative strategy for building security operations centers (SOCs) that streamline your security by focusing all security operations one central place.
Posted: 22 Apr 2015 | Published: 31 Dec 2013

IBM

Four Business Cases for Endpoint Security
sponsored by IBM
WHITE PAPER: This white paper presents four endpoint security business cases, analyzing how you can balance security with cost savings to come up with an effective and affordable way to stay secure.
Posted: 21 Apr 2015 | Published: 31 Mar 2015

IBM

Market Study: 7 Security Forensics Platforms
sponsored by IBM
WHITE PAPER: In this research report, find detailed reviews and ratings for seven leading security forensics platforms.
Posted: 21 Apr 2015 | Published: 31 Jul 2014

IBM

Research Reveals How Twelve MSS Options Perform
sponsored by IBM
WHITE PAPER: In this research report, discover how twelve MSS vendors measured up when tested.
Posted: 21 Apr 2015 | Published: 26 Feb 2014

IBM

Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: Access this white paper to explore how to improve visibility into who has access to what as well as policies and controls.
Posted: 17 Apr 2015 | Published: 09 Apr 2014

IBM

The State of Mobile Application Insecurity
sponsored by IBM
WHITE PAPER: This white paper examines why mobile app security eludes many organizations and offers steps to strengthen your security policies and minimize vulnerabilities. Read on to learn more.
Posted: 17 Apr 2015 | Published: 25 Feb 2015

IBM

Confident and Careful: The Security Benefits of the Cloud
sponsored by IBM
WHITE PAPER: In this infographic, discover why cloud security services could be the answer to your organization's needs.
Posted: 17 Apr 2015 | Published: 31 Dec 2014

IBM

Securing Apps from the First Line of Code
sponsored by WhiteHat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 16 Apr 2015 | Published: 28 Oct 2014

WhiteHat Security

Achieving Multi-Tiered Security
sponsored by Gigamon
WHITE PAPER: This white paper discusses the kind of multi-tiered security strategy that will most effectively keep your enterprise safe.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Gigamon

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this white paper to learn about another perspective in POS system security. Read on for an overview of payment card systems and attack methods, as well as how to leverage the Council on CyberSecurity's 20 critical controls to your system's advantage.
Posted: 13 Apr 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

Don’t let crime rule your network – building an efficient cyber crime strategy
sponsored by Hewlett-Packard Limited
WHITE PAPER: Featuring input from expert analysts with years of experience, this white paper presents a series of guidelines for creating security that can survive the modern threat landscape.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

Hewlett-Packard Limited

Mobile Security by Design: Reducing risk with an integrated approach
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, find tips and tricks for mobile security and mobile management planning.
Posted: 13 Apr 2015 | Published: 31 Dec 2014

Hewlett-Packard Limited
26 - 50 of 394 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement