IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability ManagementReports
1 - 25 of 618 Matches Previous Page  | Next Page
Evolving Security Efforts to Meet PCI DSS v 3.0
sponsored by CDW Corporation
WHITE PAPER: This white paper reveals the latest version of the payment card standard, which includes clarifications and new requirements that organizations must comply with by the end of 2014.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

CDW Corporation

Antivirus Alternatives: Evolving Enterprise Endpoint Security Strategy
sponsored by N-able Technologies
EGUIDE: In this e-Guide, security expert Matt Pascucci introduces an innovative strategy to fight malware that looks beyond antivirus systems, exploring alternative security measures at the cloud, network, and endpoint layers.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

N-able Technologies

Outsider Threat Protection: Building a Kill Chain Defense
sponsored by Digital Guardian
WHITE PAPER: This white paper reveals the story behind outsider threats and how to defend against these attacks that steal sensitive data.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Digital Guardian

DDos Survival Handbook
sponsored by Singlehop
WHITE PAPER: This handbook is the survival guide to fight off cyber attackers and mitigate the risk of DDoS attacks.
Posted: 29 Sep 2014 | Published: 31 Dec 2013

Singlehop

Webcast: How Much Cybersecurity is Enough?
sponsored by CDW Corporation
WEBCAST: In this webcast, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 29 Sep 2014 | Premiered: Sep 16, 2014

CDW Corporation

Podcast: How Much Cybersecurity is Enough?
sponsored by CDW Corporation
PODCAST: In this podcast, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 29 Sep 2014 | Premiered: Sep 16, 2014

CDW Corporation

How to Mitigate the Risk of Insider Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper explains how to successfully ward off insider threats by altering the operating environment.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

How Much Cybersecurity is Enough?
sponsored by CDW Corporation
TRANSCRIPT: In this presentation, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 25 Sep 2014 | Published: 25 Sep 2014

CDW Corporation

Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
sponsored by CA Technologies.
WHITE PAPER: In this in-depth report, explore new authentication security solutions that can eliminate weak password files and end the storage of passwords on the server – meaning there are no credentials for cyber criminals to steal.
Posted: 25 Sep 2014 | Published: 31 Aug 2014

CA Technologies.

Security and the Rise of Machine-to-Machine (M2M) Communications
sponsored by Global Knowledge
WHITE PAPER: In this informative resource, explore the unforeseen risks of M2M communication, the challenges of maintaining M2M security, and the possible solutions that exist to mitigate these risks.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Global Knowledge

Creating a Successful Patch Management Strategy
sponsored by N-able Technologies
EGUIDE: In this expert e-Guide, learn how to ensure that your patch management strategy remains secure following the transition from physical to virtual desktops; why delaying security patches puts organizations at risk; and how to build a case for a formal patch management program.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

N-able Technologies

Preventing Today's Mega-DDOS Attacks
sponsored by Solutionary
EGUIDE: In this expert eGuide, get an inside look at the mechanics of DDoS attacks and how organizations can best detect and prevent them.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Solutionary

When 'Secure enough' isn't enough
sponsored by Imation Corp.
WHITE PAPER: This white paper explains the reason why compliance alone may not be enough to provide the security you need, in order to prevent data breaches from occurring.
Posted: 24 Sep 2014 | Published: 01 Feb 2013

Imation Corp.

Internet Gateway Security – A state of the nation
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth white paper, discover how new next generation firewalls can protect organisations against dangerous threats as well as address the vulnerabilities created by new technologies like cloud computing and mobilisation.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Icomm Technologies

Take Control of Your IT Security with New Cyber Resilience Programs
sponsored by Sungard
WHITE PAPER: In this in-depth whitepaper, discover a new cyber resilience program that can strengthen your defense against malicious attackers, improve responsiveness and adaptability, and provide comprehensive risk management.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Sungard

Best Practices for SIEM Advanced Attack Detection
sponsored by AlienVault
EGUIDE: In this expert eGuide, discover the best practices for today's SIEM solutions and how you can maximize their performance and effectiveness in your organization's IT security.
Posted: 23 Sep 2014 | Published: 23 Sep 2014

AlienVault

Data Breach Risks of Microsoft Lync
sponsored by Actiance
WHITE PAPER: With rapid adoption of Microsoft Lync, new forms of data such as IM, chat, voice, and video are proliferating. Organizations need to deploy industrial strength methods to prevent mounting security risks. Download THIS WHITEPAPER to find out how!
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Actiance

Strengthening Security, Compliance, and Control in Microsoft® Office 365®
sponsored by Actiance
WHITE PAPER: There are some missing features in Office 365 that will prompt some customers to consider the use of third-party, cloud-based or on-premises tools to enhance Office 365's native capabilities.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Actiance

Effectively Spot Security Threats with New SSL Visibilty Solutions
sponsored by Blue Coat Systems
WHITE PAPER: In this in-depth guide, discover new SSL visibility solutions that can help organization effectively monitor encrypted traffic and detect malicious content.
Posted: 22 Sep 2014 | Published: 31 Dec 2013

Blue Coat Systems

Expose Hidden Threats with new SSL Decryption Solutions
sponsored by Blue Coat Systems
WHITE PAPER: In this informative white paper, discover how crucial new SSL decryption and inspection solutions can help organizations manage threats and sensitive data on their network.
Posted: 22 Sep 2014 | Published: 30 Nov 2013

Blue Coat Systems

Staying Protected Before, During, and After a Cyber Attack
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this informative white paper, discover a threat-centric security strategy that provides superior visibility, continuous control, and advanced threat protection– all while reducing complexity.
Posted: 19 Sep 2014 | Published: 30 Jun 2014

Cisco Systems, Inc.

Next Generation Firewalls: Here’s What You Need To Know
sponsored by HP and Intel
WHITE PAPER: This expert eGuide breaks down next-generation firewalls, their new features, and the new IT rules that come along with them.
Posted: 19 Sep 2014 | Published: 19 Sep 2014

HP and Intel

Eliminate Security Blindspots with New Encrypted Traffic Management Solutions
sponsored by Blue Coat Systems
RESOURCE: In this interactive guide, discover new encrypted traffic management solutions that can expose security blind spots without compromising privacy or regulatory compliance.
Posted: 19 Sep 2014 | Published: 19 Sep 2014

Blue Coat Systems

Why Next-Generation Firewalls Are Critical To Your Organization’s Network Security
sponsored by Icomm Technologies
WHITE PAPER: This in-depth whitepaper explores the next generation of firewalls, which can provide more effective advanced threat protection, enhanced application intelligence and control, and higher performance.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Icomm Technologies

Unified Threat Management Provides Simplified Management and Increase Security
sponsored by Sophos, Inc.
SOFTWARE DEMO: Check this software trial download to experience firsthand how new UTM solutions can help boost your current security solution with centralized management, flexible deployment, and high performance.
Posted: 18 Sep 2014 | Premiered: 18 Sep 2014

Sophos, Inc.
1 - 25 of 618 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement