IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Host Vulnerability Assessment

RSS Feed    Add to Google    Add to My Yahoo!
Host Vulnerability AssessmentReports
 
Complete your Vulnerability Management Strategy with Threat Intelligence
sponsored by AlienVault
WEBCAST: This webcast provides insight into rethinking vulnerability management. It also reviews the common challenges of vulnerability management and ways to overcome those challenges.
Posted: 18 Jul 2014 | Premiered: Jul 18, 2014

AlienVault

8 Simple Steps to Bring Shadow IT into the Light
sponsored by Rackspace
WHITE PAPER: This in-depth white paper outlines the 8 essential steps for IT professionals to drag Shadow IT into the light and regain control of their organization.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

Rackspace

App Security: Decompiling Android APK Files
sponsored by CDW Corporation
EGUIDE: In this informative e-guide, expert Andrew Hogg takes you through the steps of reverse-engineering Android applications for the purpose of scoping out security weaknesses.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

CDW Corporation

451 Research Report: AlienVault USM - A Security Operations Center for the SMB
sponsored by AlienVault
WHITE PAPER: This in-depth 451 Research analysis examines AlienVault, a security vendor tailored for small and midsize businesses.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

AlienVault

Get the Facts On APTs To Avoid Misguided Security Efforts
sponsored by IBM
WHITE PAPER: This expert E-Guide cuts through the confusion, explaining exactly what an APT is, what they are capable of, and how you can best defend your organization from them.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

Vulnerability Assessment and Penetration Testing: Can You Afford Not To?
sponsored by Pwine Express
WHITE PAPER: This informative white paper explains why vulnerability assessment and penetration testing are such critical tools in the fight against modern cybercrime, as well as how they can make a difference in your organization's security solution.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

Pwine Express

SAP Case Study
sponsored by Hewlett-Packard Company
CASE STUDY: With the escalating number and increasing sophistication of cyber-attacks, perimeter defenses are no longer enough. Companies who used HP Fortify on Demand—a cloud-based solution—saw results and achieved time to value faster. Read the report to learn how.
Posted: 04 Sep 2014 | Published: 31 Jul 2013

Hewlett-Packard Company

Cybersecurity’s Maginot Line: A Real-World Assessment Of The Defense-In-Depth Model
sponsored by FireEye
WHITE PAPER: This essential white paper outlines how organizations can update their security solutions for the modern age by reducing waste on redundant, backward-looking technology, and refocusing on defenses designed to stop today's cyber attacks.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

FireEye

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: This white paper features a security intelligence platform that integrates with data monitoring and vulnerability assessment for improved threat detection.
Posted: 07 Apr 2014 | Published: 30 Apr 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement