IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Network Vulnerability Assessment

RSS Feed    Add to Google    Add to My Yahoo!
Network Vulnerability Assessment Reports
 
The Insider Threats: Be Protected with Advanced DNS Security
sponsored by EfficientIP
WHITE PAPER: See first-hand how to implement a secure DNS architecture—such as high performance cache and real time DNS traffic analysis tools capable of adaptive countermeasures—to enhance your organization's ability to stand against internal attacks, and ensure continuity of mission-critical DNS services.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

EfficientIP

DDoS Attack Stats & Trends
sponsored by Akamai
RESOURCE: This infographic shows you crucial DDoS findings for Q1 of 2016. Learn how drastically DDoS attacks have increased, which industries they've affected the most and what you can do to protect your network.
Posted: 16 Aug 2016 | Published: 01 Jul 2016

Akamai

The Anatomy of a Ransomware Attack
sponsored by Exabeam
RESEARCH CONTENT: Read this research report to understand the business models used by ransomware network operators and how you can detect and disrupt ransomware in your corporate environments.
Posted: 25 Jul 2016 | Published: 01 Jun 2016

Exabeam

Securosis: Securing Hadoop: Security Recommendations for Hadoop Environments
sponsored by Vormetric
ANALYST REPORT: This research paper lays out a series of recommended security controls for Hadoop, along with the rationale for each. The analysis is based upon conversations with dozens of data scientists, developers, IT staff, project managers, and security folks from companies of all sizes; as well as decades of security experience the Securosis team brings.
Posted: 28 Jul 2016 | Published: 01 Jun 2016

Vormetric

Vulnerability Remediation: If you Ranked It, You Should Have Put a Patch on It
sponsored by WhiteHat Security
WEBCAST: Access this webcast now for an in-depth review of the various web security vulnerabilities you need to protect yourself from, and also discover a step-by-step guide for remediating these threats. View it now to uncover the truth about web security.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security

Research Reveals How 12 Managed Security Services Options Compare
sponsored by IBM
WHITE PAPER: This analyst report evaluates 12 leading MSSPs' strengths, weaknesses, and capabilities, including offerings from IBM, Verizon, HP, Dell, Symantec, and other major players in the industry. View now to learn how these providers stack up on criteria including the following: threat intelligence, pricing, customer experience, and more.
Posted: 21 Apr 2015 | Published: 11 May 2015

IBM

Enabling The Industrial Internet Through Software Assurance
sponsored by Synopsys
WHITE PAPER: Access this white paper to better understand the far reaching effects vulnerable industrial technologies could have on the world. Learn from organizations who have dealt with crippling cyber attacks and discover how to instill confidence in your devices' security moving forward.
Posted: 08 Sep 2016 | Published: 01 Aug 2016


Tips to Secure your Virtualized Data Center
sponsored by TechData - Kaspersky
EGUIDE: This e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.
Posted: 04 Mar 2016 | Published: 29 Feb 2016

TechData - Kaspersky

What to Look for in Vulnerability Management
sponsored by SearchSecurity.com
EBOOK: This Buyer's Essentials guide helps InfoSec pros, like you, assess and purchase vulnerability management tools. It explains how they work and highlights key features you should look for.
Posted: 07 Oct 2015 | Published: 07 Oct 2015

SearchSecurity.com

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement