IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability ManagementWhite Papers (View All Report Types)
26 - 50 of 329 Matches Previous Page  | Next Page
Malware Analysts Have the Tools to Defend Against Cyber-Attacks, But Challenges Remain
sponsored by Threat Track Security
WHITE PAPER: This informative guide explores today's threat landscape, the role of malware and the threat of internal vulnerabilities.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Threat Track Security

Enterprise Executives and Consumers Lack Confidence About Cybersecurity
sponsored by Threat Track Security
WHITE PAPER: This informative guide outlines the lack of confidence many executives and consumers have about their cybersecurity.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

Threat Track Security

U.S. Defense Contractors Say They Remain Vulnerable to Cyber-Attacks
sponsored by Threat Track Security
WHITE PAPER: This informative whitepaper outlines the vulnerability of U.S. defense contractors and explores what that means for your business.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Threat Track Security

Security in the Cloud for SAP HANA
sponsored by Vormetric
WHITE PAPER: This white paper features a data security architecture that offers encryption and granular access controls to better protect SAP HANA cloud deployments.
Posted: 10 Jun 2014 | Published: 10 Jun 2014

Vormetric

A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
sponsored by FireEye
WHITE PAPER: This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

FireEye

Evolve SiteMinder With RadiantOne
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper features a federated identity service that unifies identity policies for simplified management, helping reduce costs for growing user environments.
Posted: 04 Jun 2014 | Published: 31 Dec 2013

Radiant Logic, Inc.

Beyond the Breach
sponsored by FireEye
WHITE PAPER: This informative whitepaper takes a look at today's threat landscape and outlines the unfortunate news – security breaches are inevitable.
Posted: 04 Jun 2014 | Published: 04 Jun 2014

FireEye

Infographic: Dangerous File Sharing
sponsored by GlobalScape
WHITE PAPER: Uncover little known facts about how many employees are using consumer-grade file-sharing solutions to send business data, and what critical risk this puts organizations in.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

GlobalScape

Developing Your Authentication Strategy
sponsored by i-Sprint Innovations
WHITE PAPER: This white paper offers advice for protecting your data with several authentication strategies.
Posted: 03 Jun 2014 | Published: 31 Dec 2013

i-Sprint Innovations

Analyzing Four Widely Exploited Java Vulnerabilities
sponsored by FireEye
WHITE PAPER: This informative guide explores the technical details of the 4 most common Java vulnerabilities and outlines each step of the infection flow.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

FireEye

How To Avoid Heartbleed Or Similar SSL Related Vulnerabilities?
sponsored by i-Sprint Innovations
WHITE PAPER: This informative guide explores top strategies for resolving Heartbleed and similar SSL-related vulnerabilities.
Posted: 29 May 2014 | Published: 29 May 2014

i-Sprint Innovations

2013 Cyber Risk Report Executive Summary
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative whitepaper reviews the threat landscape of 2013 and outlines the most troublesome risks coming your way in 2014.
Posted: 28 May 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

15 Point Checklist Cloud Data Protection
sponsored by SkyHigh
WHITE PAPER: This resource offers 5 exclusive tips for protecting business data across all cloud services.
Posted: 28 May 2014 | Published: 28 May 2014

SkyHigh

Code Signing: Leveraging HSMs to Safeguard Trust and Protect Your Business
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explains how code signing works and why you need to add it to your online distribution security strategy.
Posted: 28 May 2014 | Published: 04 Feb 2014

SafeNet, Inc.

HawkEye G-The Active Defense Grid
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: This informative whitepaper takes a look at a unique security tool designed to prevent advanced persistent threats.
Posted: 27 May 2014 | Published: 27 May 2014

Hexis Cyber Solutions Inc

Globalscape® EFT Platform: Complete Visibility Over File Transfer
sponsored by GlobalScape
WHITE PAPER: This resource highlights a file transfer platform that offers complete visibility to help improve security and audit management.
Posted: 22 May 2014 | Published: 22 May 2014

GlobalScape

Case Study: Connecting Consultants and Customers Securely at Arthur D. Little
sponsored by GlobalScape
WHITE PAPER: This case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.
Posted: 22 May 2014 | Published: 22 May 2014

GlobalScape

IT Security: Midsize Businesses Face Enterprise-Caliber Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper highlights a solution that delivers a set of comprehensive, purpose-built tools that work effectively to manage and monitor security data for midsize businesses. This allows these midsize companies to leverage fast, effective and holistic data security.
Posted: 22 May 2014 | Published: 22 May 2014

Hewlett-Packard Company

Cyber Risk Report 2013
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this recent cyber risk report for key findings to help you prepare security methods for the latest threats.
Posted: 21 May 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

Vulnerabilities, Attacks, Data Breaches: Which is most important?
sponsored by IntraLinks, Inc
WHITE PAPER: This resource offers leading advice on how to leverage top vulnerability, attack, and data breach reports to help enhance your security strategies.
Posted: 15 May 2014 | Published: 15 May 2014

IntraLinks, Inc

IAM Systems Now Leverage Intelligence to Address Cloud and Mobile Apps
sponsored by IntraLinks, Inc
WHITE PAPER: This resource highlights the 4 newest roles for identity and access management (IAM) systems that enhance security for an expanding business environment.
Posted: 15 May 2014 | Published: 15 May 2014

IntraLinks, Inc

Strategy and Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This white paper offers key tips on how to extend identity and access management (IAM) to not only keep security consistent across on-premise and cloud environments, but to help reduce costs and improve efficiency as well.
Posted: 13 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

Transforming Information Security: Focusing on Strategic Technologies
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This in-depth guide outlines the current threat landscape and explores strategic technologies for your information security strategy.
Posted: 29 May 2014 | Published: 29 May 2014

RSA, The Security Division of EMC

Cyber Preppers Guide
sponsored by Threat Track Security
WHITE PAPER: This informative guide provides an effective security preparedness plan – which outlines key strategies for stopping advanced persistent threats (APTs) and other forms of sophisticated malware.
Posted: 22 May 2014 | Published: 14 May 2014

Threat Track Security

Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014

Trend Micro
26 - 50 of 329 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement