IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Host Vulnerability Assessment

RSS Feed    Add to Google    Add to My Yahoo!
Host Vulnerability Assessment Reports
 
The Expert's How-to on Vulnerability Management
sponsored by TechTarget
RESOURCE: How can enterprises get a better handle on vulnerabilities and ensure security issues aren't overlooked? With you in mind, we've created The Expert's How-to on Vulnerability Management which explores the steps you can take to develop a data breach incident response plan, the top five Web application vulnerabilities, and how to circumvent them.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Plan to Migrate before Windows Server 2003 End of Life
sponsored by Hewlett-Packard Company
EGUIDE: In this expert e-guide, explore why it is crucial to begin your migration away from WS 2003 now and what your options are for an upgrade. View a pros and cons list of several server and OS avenues you can take. Read on to discover IT professional insights to assess which solution is right for your organization's workload and budget.
Posted: 05 Dec 2014 | Published: 05 Nov 2014

Hewlett-Packard Company

Reducing the Cost and Complexity of Web Vulnerability Management
sponsored by Symantec Corporation
WHITE PAPER: Read this white paper for an explanation on why web vulnerability assessments are necessary, and provide extra security for your customers.
Posted: 13 Sep 2013 | Published: 31 Dec 2012

Symantec Corporation

Providing Security and Compliance for an Ever-Growing Number of Endpoints
sponsored by IBM
WHITE PAPER: This white paper introduces you to an easy-to-manage, quick-to-deploy solution that supports security for a large variety and large numbers of endpoints — from servers to desktop PCs, Internet-connected laptops, smartphones and other mobile devices, as well as specialized equipment such as point-of-sale devices, ATMs and self-service kiosks.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

IBM

4 Steps to Address Vulnerabilities Before a Breach
sponsored by IBM
WHITE PAPER: This white paper addresses how vulnerabilities can go undetected and gives you advice for mitigating these vulnerabilities.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

IBM

Networks That Know Virtualization
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper explains how virtualization can work in your favor, offering benefits such as scalability, agility, and efficiency. Read on to discover a checklist that contains the key attributes of a virtualized network architecture.
Posted: 27 Oct 2014 | Published: 01 Aug 2014

Juniper Networks, Inc.

All you need to know about Bash bug and how to protect your data with IBM Endpoint Manager
sponsored by IBM
WHITE PAPER: This white paper examines how the "Bash bug" allows attackers to execute malicious code within a bash shell, allowing them to gain access to confidential information by taking control of the operating system. It also highlights how you can better identify which systems are vulnerable and protect your endpoints and data from this bug.
Posted: 11 Nov 2014 | Published: 26 Sep 2014

IBM

2014 Global Report on the Cost of Cyber Crime
sponsored by Hewlett-Packard Company
WHITE PAPER: View this informative white paper report now to learn what to expect from hackers and how to safeguard your organization. Read on to learn how to assess your security needs and which platforms and systems to choose to mitigate risk by viewing things through the attacker's perspective.
Posted: 02 Feb 2015 | Published: 22 Oct 2014

Hewlett-Packard Company

Breach Preparation: Plan for the Inevitability of Compromise
sponsored by Bit9 + Carbon Black
WHITE PAPER: This important white paper provides insight from a data forensics expert, an attorney who works closely with board-of-directors-level management, a crisis communications professional, and an incident responder and technical expert to help you establish an effective incident response plan.
Posted: 12 Jan 2015 | Published: 08 Jan 2014

Bit9 + Carbon Black

Cost of a Breach Rising; How to Protect Against It
sponsored by TaaSera
EGUIDE: This expert e-guide explores how the Target breach of 2013 has changed the way organizations approach security.
Posted: 01 Dec 2014 | Published: 01 Dec 2014

TaaSera
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement