IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability ManagementReports
1 - 25 of 483 Matches Previous Page  | Next Page
How-to Build High Performance Security for the Software-Defined Data Center
sponsored by Trend Micro
PODCAST: Listen to this podcast for valuable information to consider when virtualizing your networks, especially with a whole new set of security risks to worry about. Click now for key recommendations to ensure a high-performance, secure network.
Posted: 18 Apr 2014 | Premiered: Apr 11, 2014

Trend Micro

How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast offers top, simple recommendations on how to extend existing identity and access management strategies to the cloud.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

The State of APT Preparedness: Enterprises Struggle to Adapt to Changing IT Security Risks
sponsored by Lumension
WHITE PAPER: This informative guide explores the current struggles enterprises face when adapting to changing security risks and what you can do to prepare for APTs.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Lumension

The 5 Key Tactics for Dealing with Advanced Persistent Threats
sponsored by Lumension
WHITE PAPER: This guide explores 5 key tactics for dealing with APTs and how to prevent potential APT attacks.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Lumension

Websense 2014 Threat Report, Websense Security Labs
sponsored by Websense
WHITE PAPER: In preparing the Websense® 2014 Threat Report, Websense Security Labs™ researchers examined cybersecurity through the lens of a seven-stage kill chain and attack model. Learn how to apply the seven-stage "kill chain" and attack model to your cybersecurity.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Websense

Transforming Information Security: Future-Proofing Processes
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Adapting your security strategy to today's expanding threat landscape can be a daunting task. This guide explores strategies for enhancing your security strategy and how to adapt to the current threat landscape.
Posted: 17 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

The APT Lifecycle and its Log Trail
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the APT lifecycle and helps you understand the motives behind these attacks, making it easier to prevent them.
Posted: 17 Apr 2014 | Published: 31 Dec 2013

LogRhythm, Inc.

The Top 10 Reports for Managing Vulnerabilities
sponsored by Qualys
WHITE PAPER: This paper introduces 10 of the most important vulnerability management, organized across the four key steps in the vulnerability management lifecycle.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Qualys

Managing Complexity in Identity and Access Management
sponsored by RSA, The Security Division of EMC
ANALYST REPORT: This Ponemon Institute report sheds light on your organization's level of complexity and how to best reduce it for an effective, yet easy-to-manage identity and access management (IAM) program.
Posted: 17 Apr 2014 | Published: 31 Aug 2013

RSA, The Security Division of EMC

NSS Labs: Breach Detection System Comparative Analysis
sponsored by Sourcefire
WHITE PAPER: This informative analysis tests some top breach detection technologies and compares the standards of their security and performance.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Sourcefire

Is Your AV Keeping Up?
sponsored by Lumension
WEBCAST: This informative resource takes a look at anti-virus technology and outlines how businesses can prevent sophisticated malware from infiltrating their system.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

Lumension

Top 9 Mistakes of APT Victims: What They Are and What You Can Do To Prevent Them
sponsored by Lumension
WEBCAST: This informative resource explores the role of APTs in today's current threat landscape and what you can do to prevent them.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

Lumension

The Critical Incident Response Maturity Journey
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
Posted: 16 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

A New Threat-Centric Security Model for Before, During, and After an Attack
sponsored by Sourcefire
WHITE PAPER: This guide explores a threat-centric security model designed to prevent, detect and remediate any potential cyber-attacks.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Sourcefire

Measure Risks and Vulnerability Effectively
sponsored by Hewlett-Packard Limited
WHITE PAPER: This guide explores strategies for measuring your risks and vulnerabilities, as well as understanding what you must do to achieve these goals.
Posted: 16 Apr 2014 | Published: 31 May 2013

Hewlett-Packard Limited

Third Party Applications: A Chink in Your Armour
sponsored by Lumension
WEBCAST: This webcast sheds light on the prevalence of third party application vulnerabilities. View now for key tips from industry leaders on how to reduce these risks with optimum patch management.
Posted: 15 Apr 2014 | Premiered: Apr 15, 2014

Lumension

Cisco: Scaling Application Vulnerability Management Across the Enterprise
sponsored by IBM
WHITE PAPER: This case study reveals the solution that one organization chose to help improve application security testing efficiencies at a reduced cost.
Posted: 15 Apr 2014 | Published: 28 Feb 2013

IBM

Discovering Vulnerable Web Applications
sponsored by Qualys
WHITE PAPER: This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
Posted: 15 Apr 2014 | Published: 31 Aug 2012

Qualys

Best Practices for Selecting a Web Application Scanning (WAS) Solution
sponsored by Qualys
WHITE PAPER: This informative guide explores best practices for choosing a Web application scanning solution.
Posted: 15 Apr 2014 | Published: 16 May 2013

Qualys

Best Practices for Selecting a Vulnerability Management (VM) Solution
sponsored by Qualys
WHITE PAPER: This guide explores some best practices for deploying a VM solution and outlines how it is essential for your security strategy.
Posted: 15 Apr 2014 | Published: 16 May 2013

Qualys

NSS Labs 2013 Network IPS Comparative Analysis
sponsored by IBM
WHITE PAPER: This resource explores the necessary elements to focus on when deploying a successful intrusion prevention system (IPS).
Posted: 14 Apr 2014 | Published: 31 Dec 2013

IBM

The Critical Incident Response Maturity Journey
sponsored by EMC Corporation
WHITE PAPER: This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
Posted: 14 Apr 2014 | Published: 31 Dec 2013

EMC Corporation

Maximum-Strength Threat Detection for Mid-Size Enterprises
sponsored by EMC Corporation
WEBCAST: This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation

Seven Considerations for Achieving CJIS Compliance
sponsored by Imprivata
WHITE PAPER: This white paper features a security solution that helps you ensure the Criminal Justice Information Services (CJIS) compliance requirement for advanced authentication is met by your organization, effective on September 30, 2014.
Posted: 14 Apr 2014 | Published: 31 Oct 2013

Imprivata

10 Network Security Tools and Tests Everyone Should Use
sponsored by Global Knowledge
WHITE PAPER: This paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Global Knowledge
1 - 25 of 483 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement