IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management Reports
1 - 25 of 549 Matches Previous Page  |  Next Page
Data loss prevention and enterprise file sync and sharing: is your data safe?
sponsored by Citrix
WEBCAST: Your data is always more vulnerable than you realize and threats don't always come from malicious attackers. How sure are you that your employees aren't using personal online file sharing accounts without IT approval? Watch this video for a data loss prevention solution that gives IT visibility and control to ensure file sharing security.
Posted: 06 May 2016 | Premiered: May 13, 2015

Citrix

Threat Defenses, Security Projects, and Cloud Security
sponsored by TrendMicro
EGUIDE: As 2016 gets underway, many security professionals will have the opportunity to look at advanced threats and indicators of compromise through a different lens. This exclusive e-guide takes a look at today's threat landscape and what organizations are doing to ensure data is protected.
Posted: 06 May 2016 | Published: 29 Apr 2016

TrendMicro

Proving Change in Business Critical Environments
sponsored by Ixia
WHITE PAPER: This white paper shows you how to properly test your product to meet the challenges you're responsible for. Learn how to test your project end-to-end to ensure your network can handle a new application rollout and to make sure protocols are handled properly to the lowest level.
Posted: 04 May 2016 | Published: 01 Mar 2016

Ixia

The Executive's Guide to the 2016 Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This white paper offers insights on the latest security threats and offers best practices for protecting your organization from cybersecurity attacks as they grow in sophistication. Access now to receive comprehensive data from 24 security ops centers that'll provide you with a highly accurate representation of the global threat landscape.
Posted: 03 May 2016 | Published: 01 Apr 2016

Dimension Data

Protect your Organization Against Cybercrime in the Digital Era
sponsored by Dimension Data
WHITE PAPER: This white paper shows you statistics about the past year's detected cyberattacks and gives you insight on how to protect your organization against cybercrime in today's hostile environment. Access immediately to learn where your vulnerabilities may lay and how to best protect yourself against sophisticated threats.
Posted: 03 May 2016 | Published: 01 Apr 2016

Dimension Data

Taking Container Security to the Next Level Final
sponsored by Black Duck Software
WHITE PAPER: This white paper explores the security concerns around container use and details how you can enact measures to mitigate the dangers. Access now and learn how you can protect code integrity when containers are in use and safely utilize open source code in general.
Posted: 03 May 2016 | Published: 01 Apr 2016

Black Duck Software

SCIENCELOGIC: Unmatched Visibility into Open Source
sponsored by Black Duck Software
WHITE PAPER: This white paper takes you through ScienceLogic's struggles to gain better visibility into their open source software. See how ScienceLogic was able to improve efficiency and, most importantly, security by reviewing their code before their products hit the market so they knew exactly what to change.
Posted: 03 May 2016 | Published: 01 Apr 2016

Black Duck Software

IBM Security Guardium Vulnerability Assessment
sponsored by IBM
WHITE PAPER: This white paper teaches you how to harden your data infrastructure by scanning targeted systems on a scheduled basis to detect vulnerabilities. Access now to identify exploitable security holes in your database.
Posted: 26 Apr 2016 | Published: 01 Apr 2016

IBM

5 Security Controls for an Effective Security Operations Center (SOC)
sponsored by AlienVault
WHITE PAPER: Whether you're part of a security team or a one-man show, this guide will teach you what data your SOC needs to operate effectively and what methods and tools you can use to gather that data. Download this guide now to accelerate your evaluation of SOC tools and technology needs.
Posted: 01 Apr 2016 | Published: 23 Mar 2016

AlienVault

Setting the Stage: Landscape Shifts Dictate Future Threat Response Strategies
sponsored by TrendMicro
RESOURCE: A deeper threat landscape greeted 2016—a playing field shaped by the introduction of new technologies and attack models. Access this report to see 2016's threat landscape in review, and discover why you need to reconsider traditional methods of protecting your data and assets.
Posted: 23 Mar 2016 | Published: 23 Mar 2016

TrendMicro

Mitigating and Protecting SAP and ERP Vulnerabilities
sponsored by Onapsis
EGUIDE: This e-guide discusses the more than 95% of SAP systems that are exposed to vulnerabilities and could lead to a detrimental compromise of enterprise data and processes. Access this resource now and learn how to train your staff about security risks to adopt an end-to-end security approach.
Posted: 16 Mar 2016 | Published: 14 Mar 2016

Onapsis

2016 Cyberthreat Defense Report
sponsored by Imperva
WHITE PAPER: You will learn how your spend compares to that of other organizations, what defense measures your peers have in place to defend against internal and external threats, and why weaknesses in your strategy could make your organization a "low hanging fruit".
Posted: 14 Mar 2016 | Published: 24 Feb 2016

Imperva

2016 Cyberthreat Defense Report
sponsored by LogRhythm, Inc.
WHITE PAPER: This 36-page report reveals the results from 1,000 IT security pros primary concerns about existing cybersecurity threats, defense strategies, and whether investing more in IT improves your chances of securing your organization against these threats.
Posted: 07 Mar 2016 | Published: 02 Mar 2016

LogRhythm, Inc.

PCI Compliance Protect your business from data breach
sponsored by Earthlink.
WHITE PAPER: Get stronger control over PCI compliance in this white paper by learning the 12 requirements to simplify and accelerate the process. Access this resource now to learn how to proactively protect your organization from a data breach.
Posted: 01 Mar 2016 | Published: 01 Mar 2016

Earthlink.

Oracle database licensing challenges
sponsored by Matrix42
WHITE PAPER: This white paper shows you three examples businesses whose licensing agreements with Oracle fell short of expectations. Learn some of the shortcomings these businesses experienced to protect yourself from similar involvement.
Posted: 29 Feb 2016 | Published: 27 Jan 2016

Matrix42

3 Steps to Implementing an Effective BYOD Mobile Security Strategy
sponsored by Checkpoint Software Technologies
WHITE PAPER: This white paper identifies three key steps that help to secure your mobility in a way that maximizes its benefits. Download now to get access to a checklist of capabilities you can use when evaluating mobile security solutions to ensure you can get the most out of your mobility initiatives.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Checkpoint Software Technologies

Exposing the Unknown: How Sandboxing Technology Fights Modern Threats
sponsored by Checkpoint Software Technologies
WHITE PAPER: This white paper takes a look at the modern threat landscape, including zero-day attacks and advanced persistent threats (APT), and the consequences of not protecting your company's data and networks. Access now to learn how traditional sandboxing compares to advanced sandbox solutions.
Posted: 11 Feb 2016 | Published: 30 Jun 2015

Checkpoint Software Technologies

Using Veeam and VMware vSphere Tags for Advanced Policy-driven Data Protection
sponsored by Veeam Software
WHITE PAPER: This white paper defines activities that will protect workloads based on the “desired state” that their users will define for their workloads.
Posted: 11 Feb 2016 | Published: 31 Dec 2015

Veeam Software

Broadening Your VDI Horizon Beyond Thin Client Devices
sponsored by Dell, Inc. and Intel®
EGUIDE: This exclusive e-guide details how you can move beyond traditional thin client devices for VDI access to either existing, reconfigured PCs or mobile devices. Access now and you'll learn how most non-thin-client access uses exactly the same mechanisms as thin clients.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell, Inc. and Intel®

Tips to Secure your Virtualized Data Center
sponsored by TechData - Kaspersky
EGUIDE: This e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.
Posted: 04 Mar 2016 | Published: 29 Feb 2016

TechData - Kaspersky

Vulnerability Response Best Practices
sponsored by Alert Logic
WHITE PAPER: This white paper gives you a step-by-step approach in responding to vulnerabilities with examples of breaches throughout. Learn how to prepare you network for an attack and how to lessen the potential for security flaws in your network.
Posted: 23 Feb 2016 | Published: 31 Dec 2015

Alert Logic

Cybersecurity Risks Masked by Controversial Vulnerability Counts
sponsored by Symantec Website Security
EGUIDE: In this expert e-guide, learn why experts are saying vulnerability reports aren't as dependable as you think. Discover why your organization should focus on managing risk exposure rather than rely on vulnerability counts.
Posted: 16 Feb 2016 | Published: 08 Feb 2016

Symantec Website Security

Keep Your Data Secure in the Wake of the Heartbleed OpenSSL Vulnerability
sponsored by Symantec Website Security
EGUIDE: In this e-guide, learn about the web security implications of Heartbleed, the security defect found in several OpenSSL versions. View now to find out whether your enterprise should be concerned and how to protect your data from this bug.
Posted: 11 Feb 2016 | Published: 09 Feb 2016

Symantec Website Security

Secure Your Cloud Against Exposures: How Vulnerability Management Platforms Help
sponsored by Alert Logic
WHITE PAPER: This commissioned study, conducted by Forrester Research on behalf of Alert Logic, examines how vulnerability management platforms actively/continuously scan apps and data in public cloud environments to beyond current security technologies. Read on to review how to close visibility gaps in your cloud security model.
Posted: 11 Feb 2016 | Published: 27 Jan 2016

Alert Logic

Intelligent Spear Phishing Protection: Stopping Highly Targeted Attacks
sponsored by Cloudmark
WHITE PAPER: In this brief paper, discover how today's spear phishing attacks operate, as well as how they evade conventional defenses. Learn how to employ protection against these highly targeted attacks with next-gen context analysis and real-time reporting dashboards.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

Cloudmark
1 - 25 of 549 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement