IT Management  >   Systems Operations  >   Security  >   Security Management  >   Vulnerability Management  >  

Vulnerability Assessments

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Vulnerability Assessment, Network Vulnerability, Security Vulnerabilities, Network Security Vulnerabilities, Vulnerabilities, Host Vulnerability Assessment, Internet Security Vulnerabilities
DEFINITION: A vulnerability scanner is a program that performs the diagnostic phase of a vulnerability analysis,also known as vulnerability assessment. Vulnerability analysis defines,identifies, and classifies the security holes (vulnerabilities) in acomputer, server, network, or communications infrastructure. Inaddition, vulnerability analysis can forecast the effectiveness ofproposed countermeasures, and evaluate  … 
Definition continues below.
Vulnerability AssessmentsReports
101 - 125 of 241 Matches Previous Page  | Next Page
Threat Intelligence and Data Solutions for your Security Strategy
sponsored by Dell SecureWorks UK
WHITE PAPER: This paper will discuss the benefits of threat intelligence for both the enterprise and individual security professionals, plus what costs organizations to not have threat intelligence.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Dell SecureWorks UK

Risk and Compliance Outlook
sponsored by McAfee, Inc.
WHITE PAPER: Forward-thinking companies have implemented or are in the process of developing risk management and compliance initiatives. Learn about options for auditable risk management programs that address IT security as a business risk.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

McAfee, Inc.

Software Security Delivered in the Cloud
sponsored by Hewlett-Packard Company
PRODUCT OVERVIEW: HP Fortify on Demand is a Security-as-a Service (SaaS) testing solution that allows organizations to quickly, accurately and affordably test the security of their applications without the need to manage or install any software. View now to learn more about this cloud-based, automated service.
Posted: 28 Oct 2011 | Published: 28 Oct 2011

Hewlett-Packard Company

The 2011 Mid-Year Top Cyber Security Risks Report
sponsored by HP Enterprise Security.
ANALYST REPORT: This 2011 mid-year report offers an in-depth analysis on this risks organizations face today, with special focus on web applications, including the vulnerabilities that exist and the attacks that are exploiting those weaknesses. View now to explore vulnerability trends, attack trends, mitigation strategies and much more.
Posted: 28 Oct 2011 | Published: 28 Oct 2011

HP Enterprise Security.

E-Guide: Best practices for pen testing Web applications
sponsored by Cenzic
EGUIDE: This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

Cenzic

The N-able MSP Sales & Marketing Digital Binder
sponsored by N-able Technologies
RESOURCE: This digital binder was created to provide IT Service Providers with a set of ready-made marketing resources that can be easily customized to immediately start driving recurring revenue from their existing customers, and attract new prospects.
Posted: 03 Oct 2011 | Published: 03 Oct 2011

N-able Technologies

E-Guide: Exploring Configuration Changes to Reduce Attacks
sponsored by Tripwire, Inc.
EGUIDE: Configuration changes help organizations with limited IT staff and resources not only mitigate against known threats, but also future attacks. This expert e-guide explains why firms continue to struggle with zero-day vulnerabilities and offers advice on how to lock down systems to eliminate threats posed by high-profile attacks.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

Tripwire, Inc.

A Whirlwind Tour of Wireless Vulnerabilities
sponsored by AirMagnet
PRESENTATION TRANSCRIPT: This white paper discusses the steps you must take to ensure that your wireless network is security and how to guard against vulnerabilities.
Posted: 07 Sep 2011 | Published: 07 Sep 2011

AirMagnet

Remediating IT vulnerabilities: Quick hits for risk prioritization
sponsored by McAfee, Inc.
EGUIDE: There's no way to eradicate all IT vulnerabilities, but the ability to spot critical ones is essential. This expert tip provides best practices to identify and prioritize vulnerabilities that will have the greatest impact and how to deploy limited resources in the most effective way.
Posted: 01 Sep 2011 | Published: 25 Aug 2011

McAfee, Inc.

Operational Efficiencies of Proactive Vulnerability Management
sponsored by McAfee, Inc.
WHITE PAPER: View this paper to explore the operational and economic efficiencies associated with the implementation of proactive, integrated, and automated vulnerability management compared to the inefficiencies of a reactive, manual, and fragmented security operation.
Posted: 01 Sep 2011 | Published: 29 Aug 2011

McAfee, Inc.

Presentation Transcript: Vulnerability Scanning and Compliance
sponsored by Dell SecureWorks UK
PRESENTATION TRANSCRIPT: In this presentation transcript, Lee Lawson, Head of Security Testing and Response at Dell SecureWorks, explores vulnerability scanning drivers, pros and cons for different vulnerability scanning solutions, best fit solutions for specific regulatory compliance standards, and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks UK

Assess Virtualization Security Risk in Six Simple Steps
sponsored by Intel
EGUIDE: There are several critical issues every security pro must consider when evaluating risk in virtual environments. This expert tip provides six simple steps to perform a virtualization security risk assessment and highlights key points to ease security integration as your virtualization project comes together.
Posted: 19 Aug 2011 | Published: 19 Aug 2011

Intel

Hardening Database Security
sponsored by McAfee.
WHITE PAPER: View this paper to learn how McAfee® Database Security Solution, a multitiered software solution that provides protection to all databases and data assets, warding off threats and eliminating vulnerabilities while providing compliance and maximising the efficiency of your operations.
Posted: 15 Aug 2011 | Published: 09 Aug 2011

McAfee.

Musings on the PSN Attack Vector
sponsored by Veracode, Inc.
WEBCAST: Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011

Veracode, Inc.

Xforce Trend and Risk Report 2010
sponsored by IBM
ANALYST REPORT: The IBM X-Force 2010 Trend and Risk Report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber threats.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

IBM

Why Managed DNS Services and Why Now?
sponsored by Verisign, Inc.
WEBCAST: In this webinar Yankee Group presents its Managed DNS Service Bill of Rights - what Enterprises need to expect and demand from a managed DNS service provider.
Posted: 03 Jun 2011 | Premiered: Jun 3, 2011

Verisign, Inc.

Tivoli Endpoint Manager: Continuous Compliance In A Distributed World
sponsored by Mainline Information Systems
WEBCAST: Through this webcast you will learn about endpoint security and the new solutions being offered with more tools included than previous years. You will find out how endpoint security is made up a various security tools in order to meet compliance standards and increase your organizations bottom line.
Posted: 31 May 2011 | Premiered: May 26, 2011

Mainline Information Systems

Automating IT Security Audits to Demonstrate Compliance and Protect Data
sponsored by NetIQ Europe
WHITE PAPER: This white paper will tell you why IT security auditing is so important, the problems with the current approach to it, and how this product can help you automate your IT security audits.
Posted: 18 May 2011 | Published: 18 May 2011

NetIQ Europe

Presentation Transcript: Patch Management for the IT Infrastructure
sponsored by GFI Software
PRESENTATION TRANSCRIPT: Keeping up with patches is a tedious and time consuming task for security pros, and often prompts them to look for a more efficient and effective solution. This presentation transcript discusses a patch management approach that offers effective monitoring and increased productivity.
Posted: 04 May 2011 | Published: 04 May 2011

GFI Software

E-Guide: Best practices: Effective Data Protection
sponsored by IBM
EGUIDE: This e-guide will walk you through data protection strategy and how to protect your business critical assets. Continue reading to learn best practices for effective data protection.
Posted: 29 Mar 2011 | Published: 29 Mar 2011

IBM

E-Guide: Risk Management and Compliance Enforcement for the Financial Industry
sponsored by IBM
EGUIDE: This e-guide discusses how the appropriate risk management tactics are imperative for organizations, and how companies should pay close attention to agent risk and waste no time in making it part of their risk management models.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

IBM

Close Encounters of the Third Kind
sponsored by IBM
WHITE PAPER: This paper presents results of research performed by IBM into client-side JavaScript vulnerabilities using a JavaScript Security Analyzer (JSA), which performs static taint analysis on JavaScript code that was collected from web pages extracted by an automated deep web crawl process.
Posted: 22 Mar 2011 | Published: 21 Mar 2011

IBM

How Secure Is Your Data? Enhancing Data Security And Compliance With Oracle Database 11g
sponsored by Miro Consulting, Inc.
PRESENTATION TRANSCRIPT: Most organizations suffer from data security vulnerabilities within their databases. In addition to the need for securing business data, regulations across industries demand compliance with standards regarding data access, auditing, segregation of duties and the protection of personally identifiable information (PII).
Posted: 22 Feb 2011 | Published: 22 Feb 2011

Miro Consulting, Inc.

Barclays Application Security Assurance Project
sponsored by Veracode, Inc.
CASE STUDY: As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector.
Posted: 17 Feb 2011 | Published: 17 Feb 2011

Veracode, Inc.

Trend Micro’s End-to-End Vulnerability Management: A New Approach to Layered Security
sponsored by Trend Micro, Inc.
WHITE PAPER: An explosion in system and application vulnerabilities has been met with new ways to attack these weaknesses. In this paper, EMA analysts take a look at factors driving the need for increased security, and how new approaches to mitigating vulnerabilities such as virtual patching or remediation, provide more ways to deliver vulnerability management.
Posted: 31 Jan 2011 | Published: 31 Jan 2011

Trend Micro, Inc.
101 - 125 of 241 Matches Previous Page    3 4 5 6 7 8    Next Page
 
VULNERABILITY ASSESSMENTS DEFINITION (continued): …  how well they work after theyare put into use.A vulnerability scanner relies on a database that contains allthe information required to check a system for security holes inservices and ports, anomalies in packet construction, and potentialpaths to exploitable programs or scripts. Then the scanner tries toexploit each vulnerability that is discovered. This process issometimes called ethical hacking.An ideal vulnerability scanner has capabilities such as the following: Maintenance of an up-to-date database of vulnerabilities. Detection of genuine vulnerabilities without an excessive number of … 
Vulnerability Assessments definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement