IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability ManagementReports
176 - 200 of 489 Matches Previous Page  | Next Page
Security Intelligence – Is Security a Battle You Can Win
sponsored by IBM
WHITE PAPER: This white paper details the need for IT teams to discover the benefits of security intelligence (SI), and how it can simplify the complex security environment for better security analytics.
Posted: 14 Oct 2013 | Published: 30 Jun 2011

IBM

Magic Quadrant for Application Security Testing
sponsored by Hewlett-Packard Company
ANALYST REPORT: Access this in-depth analyst report from Gartner on the top vendors in application security testing (AST) to find out which category of testing your organization needs to protect against intensifying targeted attacks.
Posted: 27 Sep 2013 | Published: 02 Jul 2013

Hewlett-Packard Company

Defeating Advanced Persistent Threat Malware
sponsored by Infoblox
WHITE PAPER: How can you protect your organization from APT Malware?  Read this whitepaper to learn why a DNS Firewall implementation is a MUST for your organization and how the Infoblox DNS Firewall may be the industry's first true DNS security solution.
Posted: 10 Sep 2013 | Published: 31 Jan 2013

Infoblox

Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: Uncover how a particular NERC CIP compliance suite provides the tools and out-of-the-box assistance you need to address numerous NERC CIP requirements, including Electronic Security Perimeter, Incident Reporting and Planning, Vulnerability Detection, and many more.
Posted: 05 Sep 2013 | Published: 29 Mar 2013

LogRhythm, Inc.

Magic Quadrant for Security Information and Event Management
sponsored by LogRhythm, Inc.
ANALYST REPORT: This Gartner Magic Quadrant on security information and event management (SIEM) systems reveals the strengths and cautions of 16 different vendors to help you find the system that best aligns with your business needs.
Posted: 03 Sep 2013 | Published: 07 May 2013

LogRhythm, Inc.

Endpoint Security: Anti-Virus Alone is Not Enough
sponsored by Lumension
ANALYST REPORT: Access this analyst report that provides researched proof as to why organizations need more than anti-virus and firewall protection to defend endpoints and networks from malicious threats.
Posted: 16 Oct 2013 | Published: 31 Dec 2012

Lumension

Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management
sponsored by Lumension
WHITE PAPER: In this white paper, gain critical information about a streamlined compliance and risk management solution that helps identify, assess, remediate, and manage IT environments to demonstrate PCI DSS requirements.
Posted: 16 Oct 2013 | Published: 31 Dec 2009

Lumension

SSL Certificate Management: Avoiding Common Mistakes
sponsored by Symantec Corporation
EGUIDE: This expert e-guide explores the most common mistakes in implementing and managing SSL certificates, and how to avoid them.
Posted: 15 Oct 2013 | Published: 11 Oct 2013

Symantec Corporation

Vulnerability Assessment
sponsored by Symantec Corporation
WHITE PAPER: Access this white paper for the truth behind today's vulnerability assessment approaches, and why a clearer vision of the problem is needed for more successful security systems. Click now to unveil an opportunity to bridge the gap between vulnerability assessment and security management, and use actionable intelligence as effective defense.
Posted: 14 Oct 2013 | Published: 14 Oct 2013

Symantec Corporation

Salvation Army Protects the Integrity of Data and Global Brand
sponsored by Lumension
WHITE PAPER: In this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.
Posted: 14 Oct 2013 | Published: 14 Oct 2013

Lumension

Website Security Threat Report, Part Two
sponsored by Symantec Corporation
WHITE PAPER: This website security threat report focuses on the threats that impact your website and online business. Access this resource to understand the threat landscape and understand how you can protect your company and your infrastructure.
Posted: 14 Oct 2013 | Published: 11 Oct 2013

Symantec Corporation

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies

The Use Case for Integrated Vulnerability Management CORE Security
sponsored by Core Security Technologies
WHITE PAPER: This white paper emphasizes the importance of an effective vulnerability management infrastructure to avoid data overload challenges and explores how to stay on track by consolidating, analyzing, and prioritizing data for maximum security.
Posted: 10 Oct 2013 | Published: 10 Oct 2013

Core Security Technologies

Cutting Complexity – Simplifying Security
sponsored by Kaspersky Lab
WHITE PAPER: Kaspersky Lab's latest whitepaper, "Cutting Complexity – Simplifying Security" looks at how the latest IT Systems Management solutions can simplify and automate a vast range of routine IT management tasks.
Posted: 10 Oct 2013 | Published: 17 Jan 2013

Kaspersky Lab

The Azzurri IT Leader Peer-to-Peer Opinion Exchange 2013
sponsored by Azzurri
WHITE PAPER: This resource features an opinion exchange on the trend in mobile device use for business workload, whether it's bring-your-own-device (BYOD), choose-your-own-device (CYOD), or don't-bring-your-own-device (DBYOD), and what this means for data security.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

Azzurri

Defense in Depth: Improve Your Threat and Vulnerability Management Programs
sponsored by Tenable Network Security
EGUIDE: SearchSecurity.com experts, Diana Kelley and Matthew Pascucci bring to you in this e-guide, five simple tips to improve your enterprise's threat and vulnerability programs and layered security, explaining how to apply defense-in-depth principles toward ultra-redundant networks.
Posted: 07 Oct 2013 | Published: 07 Oct 2013

Tenable Network Security

Three Mistakes Companies Make When It Comes to Vulnerability Management
sponsored by Core Security Technologies
WHITE PAPER: In this resource, get 3 self-assessment questions to establish whether or not your approach to vulnerability management is truly successful at mitigating future security risks.
Posted: 07 Oct 2013 | Published: 07 Oct 2013

Core Security Technologies

Converting to the Cloud and Tackling the Challenges Within
sponsored by Tenable Network Security
EGUIDE: In this expert e-guide, discover how to convert your company to the cloud. Security experts will take you through the positives and negatives of investing in the cloud and bring to light the compliance challenges that may arise when doing so.
Posted: 04 Oct 2013 | Published: 04 Oct 2013

Tenable Network Security

Reducing Your Patch Cycle to Less Than 5 Days
sponsored by Tenable Network Security
WEBCAST: This informative webcast explores the challenges of vulnerability management and creative solutions to help you fully leverage your vulnerability management process and reduce your patch cycle.
Posted: 27 Sep 2013 | Premiered: Sep 3, 2013

Tenable Network Security

Outcome Based Security Monitoring in a Continuous Monitoring World
sponsored by Tenable Network Security
WHITE PAPER: In this white paper, you will discover a five step approach that can help commercial and government organizations achieve their goals of continuous monitoring programs. Learn how this approach leverages distributed scanning, sniffing and log analysis to perform flexible, scalable and near real-time vulnerability detection for any size of network.
Posted: 27 Sep 2013 | Published: 31 Dec 2012

Tenable Network Security

10 Best Practices for Microsoft SharePoint Security
sponsored by Thawte Inc.
WHITE PAPER: In this white paper, you will discover ten best practices everyone should follow when using a leading collaboration and content management application designed to eradicate vulnerabilities in your organization.
Posted: 27 Sep 2013 | Published: 27 Sep 2013

Thawte Inc.

Gamania Group tightens security to strengthen game development capability
sponsored by Hewlett-Packard Company
WHITE PAPER: Inside this white paper, read up on a gaming software company that was looking to expand in the market, but first turned to automated security management tools to ensure compliance and customer trust before moving forward.
Posted: 25 Sep 2013 | Published: 31 Oct 2012

Hewlett-Packard Company

Implementing an Effective Vulnerability Management Program
sponsored by Tenable Network Security
WHITE PAPER: Access this white paper to gain insight into best practices for continuous vulnerability management. Find out how you can ensure security of your systems and why you should be implementing continuous vulnerability management.
Posted: 24 Sep 2013 | Published: 24 Sep 2013

Tenable Network Security

Ballarat Grammar Secures BYOD with HP Sentinel SDN
sponsored by Hewlett-Packard Company
WHITE PAPER: In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
Posted: 20 Sep 2013 | Published: 31 Aug 2013

Hewlett-Packard Company

Reconfigure Your Antimalware Strategy to Boost Endpoint Security For Advanced Threat Protection
sponsored by Webroot
EGUIDE: This expert e-guide explains why reconfiguration of your current antimalware strategy is all it takes to mitigate new trends in cyber-attacks.
Posted: 17 Sep 2013 | Published: 17 Sep 2013

Webroot
176 - 200 of 489 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement