IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management Reports
1 - 25 of 589 Matches Previous Page  |  Next Page
Defense-In-Depth with Internal Segmentation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: Deployed at strategic points, internal segmentation firewalls (ISFWs) increase threat visibility and enhance breach discovery. Learn how to stop the uncontrollable spread of cyberthreats within your borderless network and prevent any single point from introducing vulnerability.
Posted: 08 Dec 2016 | Published: 30 Nov 2016

Fortinet, Inc.

IT Decision Maker's Cybersecurity Survey 2016
sponsored by Fortinet, Inc.
WHITE PAPER: This 2016 survey of 1,399 IT decision makers (ITDMs) highlights the shared concerns of new vulnerabilities and security challenges spread across EMEA, APAC and Latin America. Learn how present security infrastructures have struggled to contend with the realities of an increasingly hostile digital world.
Posted: 08 Dec 2016 | Published: 30 Nov 2016

Fortinet, Inc.

Turning Data Protection into a Game Changer for MSPs
sponsored by LogicNow
WHITE PAPER: Learn how to not only manage customers' hardware and software but also their data as well, protecting customer's confidential or regulated data, managing their vulnerabilities and demonstrating the value of these activities in easy to understand formats.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

LogicNow

Designing an IAM Program Optimized for Your Business
sponsored by IBM
WHITE PAPER: A recent IBM report found that insiders were responsible for 60% of attacks. With evidence like that, it's time to revamp your IAM strategy. In this white paper, discover a 4-step process to maturing your IAM policies to ensure that business objectives related to security, productivity and compliance can be met.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

IBM

A Powerful Next-Gen Antivirus Solution
sponsored by Carbon Black
WEBCAST: Traditional AV simply doesn't cut it anymore. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks, from owning your database and holding your data hostage. Empower your security team to stop the most attacks, see more threats and close more security gaps.
Posted: 05 Dec 2016 | Premiered: Nov 30, 2016

Carbon Black

Three Golden Rules for Safe and Sound Endpoints
sponsored by IBM
RESOURCE: Discover best practices and new strategies to help mitigate security risk as your enterprise perimeter expands to include new endpoints. Learn a three-part approach to address vulnerabilities, increase control over your environment and ensure compliance with regulatory requirements.
Posted: 05 Dec 2016 | Published: 30 Nov 2016

IBM

Vendor Vulnerability: How to Prevent the Security Risk of Third-Party Suppliers
sponsored by Bomgar Corp.
WHITE PAPER: Learn the history of vendor ID theft and steps to mitigate its threat. Can you name the immediate and far-reaching concerns for vendor vulnerability? Find out what can be done on your end to ensure you manage (and prevent) this vulnerability.
Posted: 23 Nov 2016 | Published: 23 Nov 2016

Bomgar Corp.

Reduce Open Source Security Risk: Strategies, Tactics and Tools
sponsored by Rogue Wave Software
WHITE PAPER: Discover the tools and services you need to create an open source software (OSS) management strategy for your organization. Implementing an OSS strategy may take time, but when you consider the risks involved with unprotected OSS, it's easy to see the value it brings.
Posted: 22 Nov 2016 | Published: 31 Oct 2016

Rogue Wave Software

4 Strategies to Reduce Your Open Source Risk
sponsored by Rogue Wave Software
WHITE PAPER: Open source software is widely used by developers, but unfortunately, it's rarely created with things like troubleshooting, compliance, and security in mind. Access this white paper to explore how to enhance open source management and uncover 4 strategies that will reduce risk and improve open source audits.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

Rogue Wave Software

Resource Center: Stop Threats and Prevent Data Loss
sponsored by Intel Security
RESOURCE: Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.
Posted: 21 Nov 2016 | Published: 30 Sep 2016

Intel Security

Dynamic Security Management for a Productive Mobile Workforce
sponsored by RES Software
WHITE PAPER: This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.
Posted: 17 Nov 2016 | Published: 24 May 2016

RES Software

2016 Cyber Threat Defense Report
sponsored by Blue Coat Systems
RESOURCE: This infographic shows you the survey results from 1,000 security decision makers across 20 industries from 10 countries around the world. You'll learn stats and figures on how vulnerable they believe they are, which devices are most difficult to secure and security tools they think they need for the future.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Blue Coat Systems

2016 Cyber Threat Defense Report
sponsored by Blue Coat Systems
WHITE PAPER: In this cyber threat report, you'll discover how IT security professionals perceive today's cyber threats and plan to defend against new threats moving forward.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Blue Coat Systems

Threats and Mitigations: A Guide to Multi-Layered Web Security
sponsored by Akamai
EBOOK: Discover the various types of threats that plague internet resources, the necessary elements of an adequate web security tool, and the options available to you. Plus, learn 5 steps to improve your web application security profile.
Posted: 15 Nov 2016 | Published: 31 Oct 2016

Akamai

Threat Summary: Top 2016 Cyber Risks
sponsored by Proofpoint, Inc.
WEBCAST: Discover more about the top cyber risks we faced in 2016. Uncover threats, trends and transformations we saw in the security marketplace and receive future recommendations based on actionable intelligence.
Posted: 11 Nov 2016 | Premiered: Oct 31, 2016

Proofpoint, Inc.

Why Cybersecurity's Visibility Gap Matters and How Organizations Can Solve It
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover the origins of the cybersecurity visibility gap, its consequences and how to expand your field of view. Learn how to protect your people, data and brand more effectively by bringing your security tools beyond your network perimeter.
Posted: 10 Nov 2016 | Published: 31 Oct 2016

Proofpoint, Inc.

Outthinking Cybercrime: Prepare for the Human Factor
sponsored by Trustwave
WEBCAST: Learn some of the key risks associated with defending modern IT infrastructures and see real-world scenarios where human influence is the weak link in security.
Posted: 08 Nov 2016 | Premiered: Oct 6, 2016

Trustwave

Mitigating Security Risk from Partners, Affiliates and Suppliers
sponsored by Dell SecureWorks
WHITE PAPER: Discover tips and guidelines for managing a third party's security posture so that you can strengthen your own. Learn how to assess a third-party's potential risk carefully so you can mitigate the threat of data loss and financial ruin.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Dell SecureWorks

Infographic: Mitigating the Impact of Critical IT Events
sponsored by Splunk Services UK Ltd
WHITE PAPER: Discover facts and figures regarding critical IT events (CIE) in this infographic. You'll learn the economic impact of CIE's, how they're negatively effecting organizations and learn mitigation techniques to reduce the damage caused by CIE's.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

Splunk Services UK Ltd

3 Steps to Get Started with Web Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to make application security (AppSec) manageable. Discover three easy steps to help you get started on your new AppSec strategy.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Cracking the Code on Application Security Success
sponsored by Veracode, Inc.
WHITE PAPER: Discover how to develop your own application security (AppSec) programs to reduce cyber risk and enable business to run as smoothly as possible. Learn key answers to your most pressing AppSec questions and get practical advice for working across teams to ensure the success of your new AppSec program.
Posted: 04 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Top 10 Data Security Tips to Safeguard Your Business
sponsored by Absolute
WHITE PAPER: New IT trends typically advance faster than the processes to secure them. However, as high profile data breaches hit the headlines on a daily basis, data protection regulations are catching up. Discover 10 tips on how to safeguard your business.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Absolute

At-Risk Data in the Cloud: 3 Strategies to Stop the Data Bleed
sponsored by Absolute
WHITE PAPER: Learn about each type of insider threat and discover strategies to mitigate their impact on your organization. Visibility through routine scans to discover sensitive data in cloud-sync folders can help IT move from paranoia or a false sense of security to peace of mind.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Absolute

Are You Confident or Complacent About Your Security?
sponsored by Absolute
WHITE PAPER: In this report, uncover the survey results of over 500 IT security professionals and what they believe is the biggest threat to organizations today, confessions on what really goes on in enterprise IT, and more.
Posted: 02 Nov 2016 | Published: 02 Nov 2016

Absolute

Four Top Cybercrime Trends
sponsored by IBM
WHITE PAPER: Today, organizations are going back to the basics. The major cybersecurity trends of recent can largely be addressed by focusing on "security 101." Learn how to reduce enterprise risk and limit attackers' opportunities as much as possible.
Posted: 02 Nov 2016 | Published: 31 Dec 2015

IBM
1 - 25 of 589 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement