IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Network Vulnerability Assessment

RSS Feed    Add to Google    Add to My Yahoo!
Network Vulnerability Assessment Reports
 
Security and the Rise of Machine-to-Machine (M2M) Communications
sponsored by Global Knowledge
WHITE PAPER: In this informative resource, explore the unforeseen risks of M2M communication, the challenges of maintaining M2M security, and the possible solutions that exist to mitigate these risks.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Global Knowledge

Rising Cyber Crime Mandates More Effective Security Measures
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this in-depth white paper, get the facts from industry veterans on how to best prevent data breaches and implement effective risk management.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Limited

2014 Global Report on the Cost of Cyber Crime
sponsored by Hewlett-Packard Company
WHITE PAPER: View this informative white paper report now to learn what to expect from hackers and how to safeguard your organization. Read on to learn how to assess your security needs and which platforms and systems to choose to mitigate risk by viewing things through the attacker's perspective.
Posted: 02 Feb 2015 | Published: 22 Oct 2014

Hewlett-Packard Company

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
sponsored by SearchSecurity.com
EGUIDE: Expert Nick Lewis, CISSP, information security architect as Saint Louis University, covers in this e-guide how to implement and configure SSL's to ward off vulnerabilities within your organization.
Posted: 17 Oct 2013 | Published: 17 Oct 2013

SearchSecurity.com

Gauntlet Case Study
sponsored by CloudPassage
WHITE PAPER: Access this informative resource to find out what happened when 367 people participated in a liver server exploitation exercise that ran for 23 days across a collection of Microsoft Windows and Linux-based servers with varying combinations of applications and application frameworks installed.
Posted: 04 Sep 2014 | Published: 04 Dec 2013

CloudPassage

How SSL and TLS Secure Network Transactions
sponsored by Blue Coat Systems
EGUIDE: This expert e-guide explores how SSL and TLS can be used to defend any type of network traffic.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Blue Coat Systems

Best Practices for Security and Compliance with Amazon Web Services
sponsored by Trend Micro
WHITE PAPER: This resource sheds light on the latest expectations for cloud security, and what role providers and customers have in securing a cloud environment. Click through to reveal 12 steps to a successful secure cloud adoption.
Posted: 15 May 2014 | Published: 31 Dec 2013

Trend Micro

Knowledge is Power: The Symantec Guide to Protecting your Website
sponsored by Symantec Corporation
WHITE PAPER: This guide explores the importance of securing your system, overcoming any vulnerabilities and how this can help you maintain consumer confidence.
Posted: 30 Jan 2014 | Published: 30 Jan 2014

Symantec Corporation

6 Ways Hackers Try to Break Secure Sockets Layer-Encrypted Data
sponsored by Blue Coat Systems
EGUIDE: How do hackers break through secure sockets layer-encrypted data exactly? This expert e-guide has the answer, exploring six common methods these cyber-criminals use.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Blue Coat Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement