IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Network Vulnerability Assessment

RSS Feed    Add to Google    Add to My Yahoo!
Network Vulnerability AssessmentReports
 
5 New Laws of Antimalware Protection: Keep Up with Evolving Threats
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive whitepaper offers up five new laws you must know in order to protect your organization from ever-evolving malware threats.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Cisco Systems, Inc.

Securosis Analyst Report: Is It Time to Replace Your Current SIEM Solution?
sponsored by IBM
WHITE PAPER: In this in-depth white paper, gain critical insights into how to evaluate, select, and deploy the right SIEM solution for your organization's specific needs.
Posted: 15 Sep 2014 | Published: 28 Feb 2014

IBM

Cisco 2014 Midyear Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: As the Internet of Things accelerates, adversaries will spend even more time finding weak links across the threat landscape and using them to their advantage to compromise systems and data. Download this white paper to learn about these threats as well as industry-specific risks.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Cisco Systems, Inc.

Taming the Mobile File Sharing Beast
sponsored by Novell, Inc.
WHITE PAPER: In this in-depth white paper, uncover a solution for mobile file access that gives users unfettered access while keeping the process totally under IT control.
Posted: 10 Sep 2014 | Published: 31 Dec 2013

Novell, Inc.

Build a more-secure web infrastructure with DataPower
sponsored by IBM
WHITE PAPER: This white paper explains the importance of building a highly secure web application infrastructure, due to the growing amount of confidential business information accessible through devices.
Posted: 22 Oct 2014 | Published: 01 Aug 2012

IBM

The Top 8 Mobile Security Risks: Is Your Organzation Protected?
sponsored by BlackBerry
WHITE PAPER: In this essential white paper, discover the top 8 security risks for mobile devices and determine if your organization's assets are properly protected.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

BlackBerry

8 Simple Steps to Bring Shadow IT into the Light
sponsored by Rackspace
WHITE PAPER: This in-depth white paper outlines the 8 essential steps for IT professionals to drag Shadow IT into the light and regain control of their organization.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

Rackspace

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

Shavlik Patch: Simplified Application Patch Management for Microsoft System Center
sponsored by Shavlik Technologies
WHITE PAPER: This exclusive whitepaper explores a patch management solution that will reduce your security risks from unpatched, non-Microsoft third-party applications.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Shavlik Technologies

The Wild World of Malware: Keeping Your Company Safe from Advanced Threats
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth resource, gain essential knowledge on today's advanced malware threats, and discover how new next-generation firewalls (NGFW) can prevent them from gaining access to your valuable data.
Posted: 17 Sep 2014 | Published: 31 Jul 2012

Icomm Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement