IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management Reports
1 - 25 of 544 Matches Previous Page  |  Next Page
The Role of Automation in Optimizing Network Performance and Security
sponsored by FireMon
WHITE PAPER: As networks become more complex, network visibility reduces making it harder to identify and contain threats. Access this resource to learn how to overcome the challenges with this network security complexity gap.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

FireMon

End of Support Doesn't Have to Mean End of Security
sponsored by TrendMicro
WHITE PAPER: Does end of support mean end of security? Explore the security risks facing organizations running end of life (EOL) platforms like Windows Server 2003. Uncover 5 options to address those risks.
Posted: 11 Aug 2017 | Published: 31 Jul 2017

TrendMicro

Ransomware: Defending Against 5 Major Types
sponsored by Commvault
WHITE PAPER: Not all ransomware is alike, so no one-size-fits-all strategy exists for defending against these attacks. Explore 5 major types of ransomware attacks and learn how to defend against them to bolster your network security.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Commvault

The Future of Threat and Vulnerability Management
sponsored by BMC
RESEARCH CONTENT: In this Gartner research report, read 3 analyst predictions for the vulnerability management market. Discover key findings, market implications, and recommendations to improve your security posture.
Posted: 07 Aug 2017 | Published: 14 Nov 2016

BMC

Secure Browsing: Common Gaps, Best Practices, and New Technology
sponsored by Citrix
WHITE PAPER: Are you prepared to protect your browsers from targeted attacks seeking to compromise your organization? Take an inside look at one strategy that can help you centralize and secure browsers.
Posted: 04 Aug 2017 | Published: 31 Dec 2016

Citrix

How SecOps Addresses Critical Security Vulnerabilities
sponsored by BMC
WHITE PAPER: The rising number of devices connected to any given network, combined with common breakdown in communication between security and operations, creates a huge vulnerability problem. Use this white paper to find out how you can get your SecOps back on track.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

BMC

Securing Industrial IoT Technology: 4 Key Considerations
sponsored by Bayshore Networks
WHITE PAPER: Learn how to stop cyberthreats before they can damage critical industrial assets and systems by going inside one cyberattack launched against energy organization Consolidated Power. See how they used an industrial cyber protection platform and uncover 4 considerations for IIoT security.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Bayshore Networks

Mobile Application Security: Discovering Leaks and Remediation
sponsored by WhiteHat Security
WEBCAST: 25% of mobile apps have at least one high security risk or privacy flaw. Discover how to overcome the top issues facing mobile security and learn more about key iOS and Android vulnerabilities, mobile app security services, automated mobile app scanning, and more.
Posted: 27 Jul 2017 | Premiered: Jul 27, 2017

WhiteHat Security

Secure Coding Practices: Avoid SQL Injection
sponsored by WhiteHat Security
WEBCAST: SQL injections are one of the most common web-based attacks that have the potential to destroy key databases. Watch this webcast to learn more about SQL injections, how attackers execute them in different coding languages like Java and C#, and how best to defend against them.
Posted: 26 Jul 2017 | Premiered: Dec 31, 2016

WhiteHat Security

Making Data Encryption and Rekeying Easier
sponsored by HyTrust
WHITE PAPER: Data encryption is fundamental to successful cybersecurity in modern enterprises. But in a recent study, companies cited budget, performance concerns, and lack of deployment knowledge as the top 3 barriers to implementing an encryption tool. Inside, learn sweat-free secrets to performing critical data security functions.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

HyTrust

Product Overview: 30 Minutes to a More Secure Enterprise
sponsored by Cisco Umbrella
WHITE PAPER: DNS-layer security offers a first line of defense for your company – DNS request proceed internet activity, after all. But which DNS security is right for you? In this product overview, discover how implementing Cisco Umbrella can help you improve your company's security.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

Cisco Umbrella

Don't Just Respond – Prevent Attacks before They Happen
sponsored by Cisco Umbrella
WHITE PAPER: Discover how to use cloud-delivered security services to prevent damaging attacks before they're launched. Learn how to create an advanced threat and malware detection strategy that can proactively identify attack infrastructure with statistical models and pre-emptively protect against most zero-day threats.
Posted: 25 Jul 2017 | Published: 31 Dec 2016

Cisco Umbrella

Why Firewalls And Antivirus Alone Are Not Enough
sponsored by Cisco Umbrella
WHITE PAPER: Firewalls and antivirus defenses react to malicious code after attacks have launched – but it's becoming increasingly important to detect threats earlier and prevent attacks before they even reach fruition. Explore 4 attacks and uncover 7 common steps attackers take to achieve their objectives.
Posted: 25 Jul 2017 | Published: 31 Dec 2016

Cisco Umbrella

Securing the Evolving Enterprise Network: Inside and Out
sponsored by Aruba Networks
WHITE PAPER: What is tue current state of network security and how can it be improved? This paper from the Enterprise Strategy Group answers this by surveying current network security needs and the problems causing them, as well as why you should consider "closed-loop" network security.
Posted: 28 Jun 2017 | Published: 28 Apr 2017

Aruba Networks

How this Large North American Retail Chain Achieves Compliance, Minimizes Risk, and Mitigates Threats
sponsored by Rapid7
CASE STUDY: In this case study, learn how, by adopting this vulnerability scanning system this North American retail chain's IT team able to go beyond compliance assessments to get actionable security information, and more.
Posted: 09 Jun 2017 | Published: 09 Jun 2017


Building a More Effective Vulnerability Scanning Program
sponsored by Rapid7
WHITE PAPER: This white paper compares 2 vulnerability management systems side by side, and you can see for yourself which system is superior.
Posted: 09 Jun 2017 | Published: 09 Jun 2017


Building a World-Class Web Application Security Program
sponsored by Rapid7
CASE STUDY: Read this case study to learn the criteria that went into Microsoft's decision making process when buying their new web application vulnerability scanning system.
Posted: 08 Jun 2017 | Published: 08 Jun 2017


IT/Security Alignment Paves the Way for Effective Risk Management at University of Salzburg
sponsored by Rapid7
CASE STUDY: Find out how the University of Salzburg's small IT team was able to gain simple reporting that helped them prioritize and remediate issues based off the needs of the organization in this case study.
Posted: 08 Jun 2017 | Published: 08 Jun 2017


Gain Deeper Insights into Your System with this Vulnerability Management System
sponsored by Rapid7
WHITE PAPER: In this white paper, learn about a new vulnerability management system which can provide you with constant intelligence to discover, pinpoint, and prioritize threats to your business.
Posted: 08 Jun 2017 | Published: 08 Jun 2017


Vulnerability Management Buyer's Guide
sponsored by Rapid7
WHITE PAPER: In this buyer's guide learn the 4 essential components in an effective vulnerability management (VM) program, as well as other considerations to take into account like the price, and ROI to take into account when shopping for your VM system.
Posted: 07 Jun 2017 | Published: 07 Jun 2017


Top 10 Business Logic Attack Vectors Attacking and Exploiting Business Application Assets and Flaws – Vulnerability Detection to Fix
sponsored by Rapid7
WHITE PAPER: In this white paper, gain an overview of the top 10 business logic flaw attacks, as well as some tips on how you can test and eliminate these kinds of vulnerabilities.
Posted: 07 Jun 2017 | Published: 07 Jun 2017


When Software Goes Rogue
sponsored by BDNA
WHITE PAPER: How do you know if your software a rogue one? Do you know how to detect the rebel scum that is renegade software? Access this white paper to learn about BYOD, EOL, and EOS challenges, as well as the levels of vulnerability and how to identify your risks.
Posted: 02 Jun 2017 | Published: 31 May 2017

BDNA

Secure Apps at the Speed of DevOps
sponsored by Veracode, Inc.
RESEARCH CONTENT: This Forrester Research report explores the importance of uniting security pros with Dev and Ops to deliver on accelerated secure app development. Uncover the report's key findings to learn how to build security into earlier stages of the app lifecycle to remediate vulnerabilities without sacrificing speed.
Posted: 04 May 2017 | Published: 16 Dec 2016

Veracode, Inc.

How to Automate Security into Your DevOps Pipeline
sponsored by Veracode, Inc.
WHITE PAPER: Manual penetration testing and on-premise tools help prevent breaches, but they're too slow for an increasingly fast-paced, mobile-first world. Discover how to accelerate time-to-market without sacrificing app compliance by integrating security into your existing toolchains and DevOps pipelines.
Posted: 01 May 2017 | Published: 01 May 2017

Veracode, Inc.

Augmented Intelligence Slashes Mobile and Endpoint Vulnerabilities
sponsored by IBM
WHITE PAPER: Learn how augmented intelligence and cognitive technology, as part of a UEM, can improve mobile security and reduce vulnerabilities, increase workforce productivity, help your organization make more informed decisions, and more.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

IBM
1 - 25 of 544 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement