IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Host Vulnerability Assessment

RSS Feed    Add to Google    Add to My Yahoo!
Host Vulnerability AssessmentReports
 
451 Research Report: SIEM Platform of Choice for SMBs
sponsored by AlienVault
WHITE PAPER: In this analyst report, Javvad Malik of The 451 Group reviews AlienVault's non-traditional approach to SIEM. AlienVault's platform gives organizations of any size a solution that stands up to expensive, enterprise-level security products.
Posted: 11 Jul 2013 | Published: 25 Jan 2013

AlienVault

Quantifying the Impact of Network-Based Attacks
sponsored by Dell Software
WHITE PAPER: This document gives you some guidelines on how to assess the impact of network-based attacks and suggests techniques for creating your own economic model. Get your copy today.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Dell Software

E-Guide: Remediating IT vulnerabilities: Expert Tips
sponsored by Perimeter eSecurity
EGUIDE: This expert E-Guide uncovers 3 quick ways you can remediate IT vulnerabilities and discusses best practices for improved vulnerability management.
Posted: 10 Nov 2011 | Published: 09 Nov 2011

Perimeter eSecurity

Cybersecurity Information Sharing: Establishing New Protocols
sponsored by BMC Software, Inc.
EGUIDE: This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more.
Posted: 26 Dec 2012 | Published: 26 Dec 2012

BMC Software, Inc.

GFI Reviews and awards
sponsored by GFI LanGuard
WHITE PAPER: Access this exclusive resource to read reviews and uncover the awards given to one particular network security and vulnerability scanner by 80 different websites and critics. Learn why this award-winning solution is trusted by so many organizations across the globe!
Posted: 05 Sep 2012 | Published: 05 Sep 2012

GFI LanGuard

Predictive Security Intelligence for Retail Organizations
sponsored by Q1 Labs, an IBM Company
WEBCAST: This webcast explores how to add a new dimension to security intelligence through risk management. Extend the value of SIEM and Log Management to determine risk levels throughout your network by integrating vulnerability assessment scan results, network behavior analysis and topology, device configurations, policies, and compliance management.
Posted: 24 Feb 2012 | Premiered: Feb 24, 2012

Q1 Labs, an IBM Company

Information Security Magazine – November 2012
sponsored by Dell SonicWALL
EZINE: Consult this enlightening online magazine to learn more about how you can keep up with the rapidly changing technology trends. Find out to defend against adversaries and create a strong enterprise that's prepared for a myriad of attacks.
Posted: 13 Nov 2012 | Published: 01 Nov 2012

Dell SonicWALL

Vulnerability Assessment
sponsored by Symantec Corporation
WHITE PAPER: Access this white paper for the truth behind today's vulnerability assessment approaches, and why a clearer vision of the problem is needed for more successful security systems. Click now to unveil an opportunity to bridge the gap between vulnerability assessment and security management, and use actionable intelligence as effective defense.
Posted: 14 Oct 2013 | Published: 14 Oct 2013

Symantec Corporation

HP Mobile Application Security
sponsored by Hewlett-Packard Company
WEBCAST: Watch this informative video to learn more about some of the dangers that mobile apps pose to your business. Protecting everything from customer to enterprise data is an essential step to a secure environment. Discover the many facets of mobile security by tuning in now.
Posted: 27 Aug 2012 | Premiered: Aug 27, 2012

Hewlett-Packard Company

Information Security Magazine - April 2013
sponsored by SearchSecurity.com
EZINE: This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.
Posted: 03 Apr 2013 | Published: 03 Apr 2013

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement