IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management White Papers (View All Report Types)
51 - 75 of 474 Matches Previous Page  |  Next Page
Quarterly Cyberthreat Report
sponsored by IBM
WHITE PAPER: In this quarterly security report, discover what lessons have been learned in 2014 and how cybersecurity needs to evolve in 2015.
Posted: 17 Apr 2015 | Published: 31 Mar 2015

IBM

Confident and Careful: The Security Benefits of the Cloud
sponsored by IBM
WHITE PAPER: In this infographic, discover why cloud security services could be the answer to your organization's needs.
Posted: 17 Apr 2015 | Published: 31 Dec 2014

IBM

Securing Apps from the First Line of Code
sponsored by White Hat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 16 Apr 2015 | Published: 28 Oct 2014

White Hat Security

Why Legal and Compliance Staff Need to Tune in to Cyber Risk Management
sponsored by UnitedLex
WHITE PAPER: Access this white paper to learn why a unified or converged approach to threat management is necessary to effectively fight cyber attackers and prevent costly data breaches.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

UnitedLex

Active Visibility for Multi-Tiered Security
sponsored by Gigamon
WHITE PAPER: Access this white paper to learn how a multi-tiered security strategy can help you effectively deploy the security tools at your disposal.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Gigamon

Fending Off the Known and Unknown - Runtime Application Security
sponsored by Prevoty
WHITE PAPER: In this white paper, explore how to monitor and protect applications at runtime and neutralize known vulnerabilities as well as zero day attacks through app self-defense.
Posted: 14 Apr 2015 | Published: 01 Apr 2015

Prevoty

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this white paper to learn about another perspective in POS system security. Read on for an overview of payment card systems and attack methods, as well as how to leverage the Council on CyberSecurity's 20 critical controls to your system's advantage.
Posted: 13 Apr 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

Don’t let crime rule your network – building an efficient cyber crime strategy
sponsored by Hewlett-Packard Limited
WHITE PAPER: Featuring input from expert analysts with years of experience, this white paper presents a series of guidelines for creating security that can survive the modern threat landscape.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

Hewlett-Packard Limited

Mobile Security by Design: Reducing risk with an integrated approach
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, find tips and tricks for mobile security and mobile management planning.
Posted: 13 Apr 2015 | Published: 31 Dec 2014

Hewlett-Packard Limited

The Importance of the Right Endpoint Security Measures
sponsored by Dell, Inc.
WHITE PAPER: This research report presents the results of a survey on endpoint security across businesses of all sizes.
Posted: 13 Apr 2015 | Published: 30 Nov 2013

Dell, Inc.

SSL Traffic Management to Meet Your Needs
sponsored by Blue Coat Systems
WHITE PAPER: In this infographic, discover a tool that gives you the all the capabilities you need for effective traffic monitoring.
Posted: 09 Apr 2015 | Published: 28 Feb 2015

Blue Coat Systems

Advanced Threat Protection Lifecycle Defense
sponsored by Blue Coat Systems
WHITE PAPER: In this infographic, discover a method of advanced threat protection that fights every step of the advanced threat lifecycle.
Posted: 09 Apr 2015 | Published: 09 Apr 2015

Blue Coat Systems

Strengthen your Next-Generation Malware Analysis
sponsored by Blue Coat Systems
WHITE PAPER: In this brief infographic, discover how malware analysis and content filtering can help you achieve advanced threat protection.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Blue Coat Systems

Under Threat or Compromise Every Detail Counts
sponsored by Blue Coat Systems
WHITE PAPER: This white paper breaks down the five essential steps of security management to help you create a more comprehensive defense suited for today's threat landscape.
Posted: 08 Apr 2015 | Published: 31 Aug 2014

Blue Coat Systems

2015 Cyberthreat Defense Report
sponsored by Blue Coat Systems
WHITE PAPER: This report, which focuses specifically on IT security management, uses research to reveal what areas of security you should turn your attention to.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Blue Coat Systems

Security Empowers Business
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover a way of creating security systems that are a proactive business asset, not a reactive way to slow the business down.
Posted: 07 Apr 2015 | Published: 31 May 2013

Blue Coat Systems

The Business Value of a Comprehensive All-in-OneData Protection Solution for Your Organization
sponsored by Asigra
WHITE PAPER: Access this white paper to learn how to develop a comprehensive data protection strategy to have transparent visibility and complete control. View now to explore the five common failures of data protection and how to overcome each.
Posted: 06 Apr 2015 | Published: 11 Feb 2015

Asigra

TOP 5 CRITICAL CAPABILITIES FOR YOUR MALWARE SANDBOXING STRATEGY
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover the top five criteria of effective malware sandboxing.
Posted: 06 Apr 2015 | Published: 31 Mar 2014

Blue Coat Systems

What's Your Next Security Move?
sponsored by FireEye
WHITE PAPER: This quick self-assessment will help you navigate to your next big security decision and create better protection against advanced attackers.
Posted: 06 Apr 2015 | Published: 31 Dec 2014

FireEye

Security Vs. Innovation: Do CIOs have to choose?
sponsored by Red Hat
WHITE PAPER: This article shows how you can balance your need for business innovation and security by introducing a secure datacenter that allows for secure BYOD, cloud computing and more.
Posted: 03 Apr 2015 | Published: 31 Dec 2014

Red Hat

Security Reimagined: An Adaptive Approach for the Digital Age
sponsored by FireEye
WHITE PAPER: It's time to reimagine how we do security. This white paper shows you how with tips on creating an integrated, proactive security system designed for the cybercrime of today.
Posted: 03 Apr 2015 | Published: 31 Dec 2014

FireEye

Prepare Yourself for the Cybercrime of 2015
sponsored by FireEye
WHITE PAPER: This 2015 cybercrime report analyzes the threats of 2014 and makes predictions for what you need to be prepared for in the upcoming year.
Posted: 02 Apr 2015 | Published: 31 Dec 2014

FireEye

Cloud Security in an Agile World
sponsored by Rackspace
WHITE PAPER: This white paper tells you exactly what security precautions need to be taken when using cloud services.
Posted: 02 Apr 2015 | Published: 31 Dec 2014

Rackspace

Securing Your Business Against SSL-Based Attacks
sponsored by Radware
WHITE PAPER: Access this white paper to uncover the four challenges of defending against DoS-based SSL attacks. Read on to learn why current defense solutions are falling short and the triple layer defense strategy that replaces them.
Posted: 31 Mar 2015 | Published: 10 Apr 2013

Radware

Automating App Blacklisting
sponsored by Veracode, Inc.
WHITE PAPER: This white paper explores how to roll out a BYOD strategy that includes both preventative and detective controls to fill in the vulnerability gaps.
Posted: 01 Apr 2015 | Published: 04 Feb 2015

Veracode, Inc.
51 - 75 of 474 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement