IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management Reports
176 - 200 of 714 Matches Previous Page  |  Next Page
Protecting Your Organization from DNS Security Threats
sponsored by Cloudmark
WEBCAST: This webinar provides a detailed look at common threats to DNS infrastructure, and how your enterprise can mitigate these threats.
Posted: 26 Jan 2015 | Premiered: Nov 13, 2014

Cloudmark

Web Application Security for Dummies
sponsored by Qualys
EBOOK: This e-book explains how to quickly locate and remediate vulnerabilities in order to prevent attackers from gaining control over the application and obtaining access to the server, database, and other back-end IT resources.
Posted: 26 Jan 2015 | Published: 30 Dec 2011

Qualys

Six Essential Elements of Web Application Security
sponsored by Qualys
WHITE PAPER: This white paper discusses the most common classes of web application vulnerabilities, and how hackers most often take advantage of these weaknesses. Read on to learn the 6 essential elements of web application security that are the most valuable places for IT teams to invest their time and resources.
Posted: 26 Jan 2015 | Published: 31 Oct 2013

Qualys

Risk I/O Explainer Video
sponsored by Risk IO
WEBCAST: Download this exclusive video now to learn about a vulnerability management solution that will reveal your system vulnerabilities, identify those most at risk, show you exactly what you need to fix, and much more.
Posted: 26 Jan 2015 | Premiered: Jan 15, 2014

Risk IO

Best Practices for Selecting a Web Application Scanning (WAS) Solution
sponsored by Qualys
WHITE PAPER: This white paper explains how a Web Application Scanning solution can help you to locate and test web-based apps, and provides a checklist of best practices that will help you to understand what to look for when selecting a WAS solution.
Posted: 23 Jan 2015 | Published: 16 May 2013

Qualys

Learn About Each Module of the Allgress Insight Risk Management Suite
sponsored by Allgress
WHITE PAPER: This white paper introduces a risk management suite that enables security professionals to apply business context to security and compliance management. It also empowers business stakeholders to make informed investment decisions that align with top business priorities.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

Allgress

Protecting printer with Enterprise-Grade Security
sponsored by Hewlett-Packard Limited
WHITE PAPER: Continue on to this important white paper now to learn about the risks of lax printing security and discover a printer security solution that can fill in any gaps in your façade.
Posted: 23 Jan 2015 | Published: 16 Dec 2014

Hewlett-Packard Limited

Top 5 Vulnerability Management Mistakes
sponsored by Risk IO
WEBCAST: Download this important webcast now to learn about the top five most common vulnerability management mistakes.
Posted: 23 Jan 2015 | Premiered: Jan 23, 2015

Risk IO

Security at the Speed of DevOps
sponsored by Risk IO
WEBCAST: This exclusive webcast explores the role DevOps can play in helping IT security make the most of their time.
Posted: 23 Jan 2015 | Premiered: Jan 13, 2015

Risk IO

Infographic: Is Your DNS Really Protected?
sponsored by Cloudmark
RESOURCE: View this informative infographic now to learn more about the consequences of DNS attacks, and how you can prevent them within your enterprise.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Cloudmark

Allgress Vulnerabilty Analysis Module
sponsored by Allgress
WHITE PAPER: Check out this important white paper now to learn about a vulnerability management program that can automate your entire workflow.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Allgress

The Problem with Your Threat Intelligence
sponsored by Risk IO
WHITE PAPER: This exclusive white paper explores some common security intelligence mistakes you might be making.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Risk IO

5 Secrets and 2 Gotchas of Vulnerability Scanning
sponsored by Risk IO
WHITE PAPER: IT security is the unsung hero of your organization. They stay on top of threats, attacks, and potential exploits to keep you and your company safe every day.
Posted: 21 Jan 2015 | Published: 21 Jan 2015

Risk IO

Securing the Future of Trust on the Internet
sponsored by Symantec Corporation
WHITE PAPER: This white paper explains why public key infrastructure (PKI) is the key to the future of trust on the Internet, and the steps that must be taken to build a stronger, more trustworthy PKI ecosystem.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

How Security Practitioners Can Use Data to Make Intelligent Decisions that Minimize Risk
sponsored by Risk IO
WHITE PAPER: This exclusive white paper explores how an organization can utilize their data to make intelligent decisions that minimize your risk.
Posted: 20 Jan 2015 | Published: 02 Jan 2014

Risk IO

Protecting Against Web Application Threats Using SSL
sponsored by Symantec Corporation
WHITE PAPER: In this resource, readers learn about the many factors that leave web applications vulnerable to attack; how SSL encryption can help to prevent the risk of data loss; how to assess their current state of vulnerability; and much more.
Posted: 19 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Specialty Gift Retailer Keeps Point-of-Sale Devices— and Customers’Information—Secure with Bit9
sponsored by Bit9 + Carbon Black
CASE STUDY: This exclusive case study details the security platform one retailer chose to protect themselves from advanced threats.
Posted: 16 Jan 2015 | Published: 16 Dec 2014

Bit9 + Carbon Black

Breach Detection: What You Need to Know
sponsored by Bit9 + Carbon Black
WHITE PAPER: This important e-book explores the tactics advanced attackers use to break into your organization and how a defense-in-depth cyber-security program with automatic detection and incident response can help you fight back.
Posted: 15 Jan 2015 | Published: 16 Jan 2014

Bit9 + Carbon Black

Endpoint Threat Detection, Response, and Prevention for Dummies
sponsored by Bit9 + Carbon Black
EBOOK: The exclusive e-book covers the changes to endpoint security you have to make in today's evolving threat landscape.
Posted: 15 Jan 2015 | Published: 09 Jan 2014

Bit9 + Carbon Black

Protecting Users from Firesheep and other Sidejacking Attacks with SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the Firesheep Wi-Fi attack tool and other sidejacking attacks with SSL and explains how to avoid these attacks.
Posted: 15 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

5 Steps For Windows Server 2003 End of Life Success
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this white paper today to learn the 5 steps that your organization needs to take now to ensure that your enterprise is prepared for Microsoft Windows Server 2003's end-of-life in six short months.
Posted: 14 Jan 2015 | Published: 06 Nov 2014

Bit9 + Carbon Black

Phishing Tactics
sponsored by Symantec Corporation
WHITE PAPER: This fraud alert highlights the current growth and trends in today's phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Posted: 12 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Breach Preparation: Plan for the Inevitability of Compromise
sponsored by Bit9 + Carbon Black
WHITE PAPER: This important white paper provides insight from a data forensics expert, an attorney who works closely with board-of-directors-level management, a crisis communications professional, and an incident responder and technical expert to help you establish an effective incident response plan.
Posted: 12 Jan 2015 | Published: 08 Jan 2014

Bit9 + Carbon Black

The Compliance and Security Balancing Act
sponsored by Mimecast
EGUIDE: In this expert guide, Karen Scarfone provides several practical tips on technologies that improve enterprise email security, and Christine Parizo discusses how to strike an ideal balance between compliance and security, when "compliant" doesn't necessarily mean "secure."
Posted: 22 Dec 2014 | Published: 22 Dec 2014

Mimecast

Plan to Migrate Before Windows Server 2003 End of Life
sponsored by Hewlett-Packard Company
EGUIDE: View this expert e-guide to examine your options when migrating away from WS 2003 and how to overcome challenges. Discover how to assess which upgrade avenue is right to pursue for your workload and what is waiting for you if you choose not to migrate.
Posted: 10 Dec 2014 | Published: 04 Nov 2014

Hewlett-Packard Company
176 - 200 of 714 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement