IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management Reports
101 - 125 of 663 Matches Previous Page  |  Next Page
Don't Let Your DDoS Defense Fall Behind
sponsored by Neustar®
WHITE PAPER: This white paper gives you information on how DDoS attacks have evolved and what you can do to stop them.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

Neustar®

Discover How to Guard Against Healthcare Cybercrime
sponsored by NaviSite
WHITE PAPER: Healthcare data is as valuable as gold on the black market, and thieves are drawn to the profits. Now, with more data stored digitally and more hackers taking advantage of that, the healthcare industry needs better security than ever.
Posted: 19 Feb 2015 | Published: 01 Jan 2015

NaviSite

New Threats to Healthcare and How to Stop them
sponsored by NaviSite
WEBCAST: This webcast provides you with a detailed analysis of healthcare's security threats and suggestions for combatting them.
Posted: 19 Feb 2015 | Premiered: Feb 19, 2015

NaviSite

Cybercrime's Underground Economy
sponsored by Neustar®
WEBCAST: This webcast explores the underground criminal world of cybercrime, uncovering its different roles and giving you the rare chance to watch some of these illegal transactions live.
Posted: 18 Feb 2015 | Premiered: Jan 31, 2015

Neustar®

Whitelisting: Develop Advanced Malware Protection
sponsored by Viewfinity
EGUIDE: This guide gives you a rundown on how whitelisting can help your security and what you can do to implement it.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

Viewfinity

Should Employees Have Local Admin Rights?
sponsored by Viewfinity
EGUIDE: This expert guide lays out the pros and cons of granting users local admin rights and suggests strategies for maintaining safety if you do choose to give out those rights.
Posted: 16 Feb 2015 | Published: 01 Jan 2015

Viewfinity

Cisco 2015 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This report reveals up-to-date data on many of the most important security concerns facing organizations in 2015.
Posted: 16 Feb 2015 | Published: 01 Jan 2015

Cisco Systems, Inc.

Four Tools for Capturing DDoS Attacks
sponsored by Neustar®
WHITE PAPER: This exclusive white paper describes four of the best tools you can use to detect DDoS attacks quickly.
Posted: 16 Feb 2015 | Published: 31 Dec 2014

Neustar®

4 Data Traffic Security Challenges Exposing Enterprises to Hack Attacks
sponsored by Certes Networks
WHITE PAPER: This white paper discusses the 4 major points of weakness that your enterprise needs to prioritize in 2015 in order to defend your business-critical data from hackers.
Posted: 12 Feb 2015 | Published: 22 Jan 2015

Certes Networks

Discover What Admin Users are Doing with Free Download
sponsored by Viewfinity
RESOURCE: This local administrator tool gives IT professionals information on who has admin rights on and how they're using these rights.
Posted: 12 Feb 2015 | Published: 09 Feb 2015

Viewfinity

HP: Protecting Printers with Enterprise Grade Security by Moor Insights and Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores the key security risks presented by today's networked printer and offers an overview of some innovative solutions that address them.
Posted: 11 Feb 2015 | Published: 30 Sep 2014

Hewlett-Packard Company

An Expert Guide on Vulnerability Management Programs
sponsored by Risk IO
EGUIDE: With this helpful e-guide, learn how to best implement authenticated vulnerability scans to make the most of your security practices.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Risk IO

The Executive Breach Blanket: 7 Steps to Safeguard Your Corporate Data
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper contains an effective 7-step process for ensuring that your business is ready to respond to data breaches.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Hewlett-Packard Company

Application Control: Monitoring, Visibility and More
sponsored by Viewfinity
WEBCAST: This webcast discusses integrated and multifaceted methods of keeping business applications safe.
Posted: 10 Feb 2015 | Premiered: Feb 10, 2015

Viewfinity

Human Vulnerabilities in Our Current Threat Landscape
sponsored by Global Knowledge
WHITE PAPER: This white paper enables you to educate your employees on security best practices and current human vulnerabilities, helping you to ensure that you're not a part of the many organizations that are breached.
Posted: 10 Feb 2015 | Published: 31 Jan 2015

Global Knowledge

Securing the Enterprise in 2015: 5 pragmatic steps to security
sponsored by Dell SecureWorks
WHITE PAPER: This white paper outlines a 5-step plan for developing strong security no matter what security product is used.
Posted: 10 Feb 2015 | Published: 31 Jan 2015

Dell SecureWorks

IDC Essential Guidance: Securing the Enterprise: Multifunction Printer Risks and Solutions
sponsored by Hewlett-Packard Company
WHITE PAPER: This analyst brief reveals the consequences of nonsecure MFPs, and offers essential guidance on how to secure them.
Posted: 10 Feb 2015 | Published: 31 Jul 2014

Hewlett-Packard Company

How to Protect Sensitive Retail Data
sponsored by IBM
WHITE PAPER: This white paper goes into detail about the threats facing retail enterprises and how to mitigate them.
Posted: 09 Feb 2015 | Published: 30 Nov 2014

IBM

It's Not All Black & White: A Practical Method for Blacklisting & Whitelisting
sponsored by Viewfinity
WHITE PAPER: This brief white paper gives a suggestion for how to streamline the whitelisting and blacklisting process, including what to do with the multitude of programs in a gray area between blacklists and whitelists.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Viewfinity

Mitigating the Biggest Security Threat of all – Your Users
sponsored by Viewfinity
WHITE PAPER: This white paper describes one method of giving users the admin rights they need while still mitigating the risks they pose.
Posted: 09 Feb 2015 | Published: 01 Feb 2012

Viewfinity

How Hackers Exploit Admin Rights to Access Your Systems
sponsored by Viewfinity
WEBCAST: In this webcast you can watch a live hack to see how hackers gain admin rights in order to compromise your system.
Posted: 09 Feb 2015 | Premiered: Feb 9, 2015

Viewfinity

Recognizing Five Sources of High-Profile Data Security Breaches
sponsored by Mimecast
WHITE PAPER: This white paper discusses the 5 major categories of vulnerabilities that IT and security professionals need to account for in their solutions planning.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

Mimecast

The Effectiveness of a SIEM System According to IT Professionals
sponsored by IBM
WHITE PAPER: The following document profiles how IT professionals rate one possible SIEM solution.
Posted: 05 Feb 2015 | Published: 28 Feb 2014

IBM

Few Businesses Feel Fully Prepared for Software Security Risks
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper reveals the results of a recent survey that explored enterprises' confidence in the security of the software that runs their businesses.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Hewlett-Packard Company

Streamlining Multifunction Printer Security
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper describes an example of how you can efficiently enhance your MFP security with centralized and automated security settings.
Posted: 11 Feb 2015 | Published: 31 Mar 2013

Hewlett-Packard Company
101 - 125 of 663 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement