IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management Reports
1 - 25 of 542 Matches Previous Page  |  Next Page
Unmask Evasive Threats: Zero-Day Threat Detection and App Containment
sponsored by McAfee, Inc.
WHITE PAPER: This white paper explores how to bolster your defense to catch up to and overcome advanced malware threats. Fortify endpoints and learn how to halt zero-day malware in its tracks by discovering which threat detection and containment tools can unmask the most sophisticated hidden threats.
Posted: 11 Apr 2017 | Published: 31 Oct 2016

McAfee, Inc.

Augmented Intelligence Slashes Mobile and Endpoint Vulnerabilities
sponsored by IBM
WHITE PAPER: The business world has been increasingly mobile for years, but it hasn't been until now that cyberthreats have been aimed at mobile devices. Unified endpoint management has come to integrate augmented intelligence and cognitive technology. Access this white paper to learn how these two technologies are improving mobile security.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

IBM

Maximizing IT Security with Configuration Management
sponsored by Puppet
WHITE PAPER: This white paper explores how to leverage configuration management to bolster security and meet compliance regulations. Uncover some of the key benefits, including the creation of a Standard Operating Environment (SOE), reporting on and control of configuration drift, enhanced change remediation, and more.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

Puppet

Vulnerability Management Tools Compared
sponsored by TechTarget
RESOURCE: Comparing vulnerability assessment tools requires looking beyond the core feature level to consider additional security-related capabilities that provide more robust and comprehensive offerings. Vulnerability Assessment Tools: Comparing Top Vendors, provides unbiased reviews of top contenders so you can see how each could protect you from attack.
Posted: 03 Mar 2017 | Published: 03 Mar 2017

TechTarget

Maintain Compliance with Around-the-Clock Monitoring and Threat Management
sponsored by Hewlett-Packard Enterprise
CASE STUDY: It's challenging to protect your organization quickly and accurately when you're overwhelmed by security alerts. Discover how a major North American hospital reduced its exposure to compliance problems by leveraging managed security services to enable around-the-clock monitoring of security logs.
Posted: 02 Mar 2017 | Published: 29 Feb 2016

Hewlett-Packard Enterprise

2017 Annual Cybersecurity Report
sponsored by Cisco Umbrella and Dimension Data
RESEARCH CONTENT: This 2017 Annual Cybersecurity Report explores how to implement an integrated security architecture by connecting your security tools to work together in an automated, streamlined environment.
Posted: 28 Feb 2017 | Published: 31 Jan 2017

Cisco Umbrella and Dimension Data

When Downtime Takes a Bite out of Your Budget
sponsored by Globalscape
EBOOK: Unplanned downtime and data loss will ultimately affect an organization's bottom line. Discover how to develop a robust data protection strategy that helps defend your most critical assets and learn how to create visibility into data transfers, meet compliance, simplify disaster recovery, and more.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Globalscape

Taking a Proactive Approach to Addressing Ransomware
sponsored by AttackIQ
WEBCAST: In this webcast, industry expert Kevin Beaver discusses the challenges associated with ransomware and proactive steps that can be taken to minimize the threat and fortify information security programs.
Posted: 17 Feb 2017 | Premiered: Feb 8, 2017

AttackIQ

Busting the Myth of the Malware “Silver Bullet”
sponsored by McAfee, Inc.
WHITE PAPER: This white paper explores how to architect an anti-malware and endpoint security toolbox that relies on coordinating multi-layer, sophisticated defense. Discover which technologies can be connected to bolster your security posture, and learn about 3 critical layers of defense for keeping up with modern threats.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

McAfee, Inc.

Leverage On-Demand Testing with Vulnerability Analytics
sponsored by IBM
WHITE PAPER: Explore how to leverage enterprise vulnerability testing services in conjunction with a portal for collaboration, project management, and reporting in order to improve your security posture. Unlock capabilities like on demand testing, vulnerability analytics and dashboards, balanced manual and automated testing, and more.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

IBM

The Benefits of Bug Bounty Programs and Security Code Testing
sponsored by Veracode, Inc.
RESEARCH CONTENT: In this survey from Wakefield research, find out how a variety of IT professionals are adapting to new vulnerabilities as well as additional steps you can take to keep your app safe from both external and internal threats.
Posted: 13 Jan 2017 | Published: 13 Jan 2017

Veracode, Inc.

Exploit Kits: Getting In by Any Means Necessary
sponsored by Palo Alto Networks
WHITE PAPER: This white paper explores the concept of exploit kits and how to defend against them. Uncover tips for reducing your attack surface, blocking known malware and exploits, identifying new threats, and more.
Posted: 19 Dec 2016 | Published: 19 Dec 2016

Palo Alto Networks

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices
sponsored by Absolute
WHITE PAPER: Whether it is from human error or malicious outsiders, a diligent IT department can diminish the risk of lost or stolen data. Learn 7 best practices healthcare organizations can put in place to ensure the safety of patient information on mobile devices.
Posted: 15 Dec 2016 | Published: 31 Dec 2015

Absolute

Turning Data Protection into a Game Changer for MSPs
sponsored by Solarwinds MSP
WHITE PAPER: MSPs are forced to move at the pace dictated by cybercriminals, rapid. Learn how to not only manage customers' hardware and software but also their data. Uncover how to protect customer's confidential or regulated data, manage their vulnerabilities and demonstrate the value of these activities in easy to understand formats.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

Solarwinds MSP

Designing an IAM Program Optimized for Your Business
sponsored by IBM
WHITE PAPER: A recent IBM report found that insiders were responsible for 60% of attacks. With evidence like that, it's time to revamp your IAM strategy. In this white paper, discover a 4-step process to maturing your IAM policies to ensure that business objectives related to security, productivity and compliance can be met.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

IBM

Demo: Next-Gen Antivirus in Action
sponsored by Carbon Black
WEBCAST: Learn how next-generation antivirus protection works in this quick demonstration. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks from owning your database and holding your data hostage.
Posted: 05 Dec 2016 | Premiered: Nov 30, 2016

Carbon Black

2016 Cyber Threat Defense Report
sponsored by Symantec & Blue Coat Systems
RESOURCE: This infographic shows you the survey results from 1,000 security decision makers across 20 industries from 10 countries around the world. You'll learn stats and figures on how vulnerable they believe they are, which devices are most difficult to secure and security tools they think they need for the future.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Symantec & Blue Coat Systems

2016 Cyber Threat Defense Report
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: In this cyber threat report, you'll discover how IT security professionals perceive today's cyber threats and plan to defend against new threats moving forward.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Symantec & Blue Coat Systems

Top 10 Data Security Tips to Safeguard Your Business
sponsored by Absolute
WHITE PAPER: New IT trends typically advance faster than the processes to secure them. However, as high profile data breaches hit the headlines on a daily basis, data protection regulations are catching up. Discover 10 tips on how to safeguard your business.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Absolute

At-Risk Data in the Cloud: 3 Strategies to Stop the Data Bleed
sponsored by Absolute
WHITE PAPER: Learn about each type of insider threat and discover strategies to mitigate their impact on your organization. Visibility through routine scans to discover sensitive data in cloud-sync folders can help IT move from paranoia or a false sense of security to peace of mind.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Absolute

The Phishing Breakthrough Point
sponsored by KnowBe4
WHITE PAPER: Habits take time to form and become part of one's daily life – the same applies to being cyber street-smart about phishing prevention. Learn how to create a more effective phishing awareness training program through deeper analysis of the human landscape of your organization.
Posted: 12 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Resource Center: Stop Threats and Prevent Data Loss
sponsored by Intel Security
RESOURCE: Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.
Posted: 21 Nov 2016 | Published: 30 Sep 2016

Intel Security

Dynamic Security Management for a Productive Mobile Workforce
sponsored by RES Software
WHITE PAPER: This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.
Posted: 17 Nov 2016 | Published: 24 May 2016

RES Software

Four Top Cybercrime Trends
sponsored by IBM
WHITE PAPER: Today, organizations are going back to the basics. The major cybersecurity trends of recent can largely be addressed by focusing on "security 101." Learn how to reduce enterprise risk and limit attackers' opportunities as much as possible.
Posted: 02 Nov 2016 | Published: 31 Dec 2015

IBM

QRAT Malware-As-A-Service
sponsored by Booz Allen Hamilton
WHITE PAPER: QRAT, a new remote access tool, first emerged in 2015 and is now targeting U.S. visa applicants via Skype's messenger service. Discover why QRAT is dangerous and how it can infect your system within this valuable white paper. Learn who's behind the QRAT tool, where it originated and why it may be targeting you right now.
Posted: 24 Oct 2016 | Published: 30 Jun 2016

Booz Allen Hamilton
1 - 25 of 542 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement