IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability ManagementReports
226 - 250 of 488 Matches Previous Page  | Next Page
Case Study: Novagalicia Secures Critical Applications with HP Fortify
sponsored by Hewlett-Packard Limited
CASE STUDY: Assessing and improving the security of applications used in financial institutions is paramount. This case study explores the security-as-a-service (SaaS) testing solution one bank used after a merger to quickly and accurately assess their nearly 400 applications. View now to learn more!
Posted: 06 May 2013 | Published: 30 Apr 2013

Hewlett-Packard Limited

Security Intelligence for a Faster World
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource explores how a new security information and event management (SIEM) system provides the unparalleled protection your organization needs to face the risks of big data.
Posted: 22 Apr 2013 | Published: 31 May 2012

Hewlett-Packard Company

Protect Your IT Systems with Next Generation Security
sponsored by IBM
WHITE PAPER: This informative whitepaper covers the constant threat of hackers to the security of your organization and offers a solution to help keep your data safe.
Posted: 16 Apr 2013 | Published: 31 Oct 2012

IBM

Targeted Attack Detection and Remediation Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn more about how targeted attacks are developed, where your soft spots may be, how attackers are moving data off your networks and what you can do about it.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

SearchSecurity.com

Inside IBM Intelligent Investigation Manager
sponsored by IBM
VIDEO: Sit back for five minutes to watch this video and catch an inside look at a technology designed to protect your organization from fraud, which is more malicious and easier than ever across today's expansive IT and business operations.
Posted: 18 Mar 2013 | Premiered: 16 Nov 2012

IBM

Security Essentials for CIOs
sponsored by IBM
WHITE PAPER: Read this whitepaper and learn five important steps to consider when embarking on a BYOD program - steps that will make BYOD use a reality by seamlessly securing corporate data and applications on the device while providing a logical separation from personal activities and data.
Posted: 15 Mar 2013 | Published: 14 Mar 2013

IBM

IBM zSecure Compliance and Administration
sponsored by IBM
WEBCAST: View this webcast to learn how you can improve collaboration with your employees and business data. Find out the key to keeping up with today's fast-paced culture and how you can ensure your data is protected no matter where your employees access the information.
Posted: 11 Mar 2013 | Premiered: Mar 11, 2013

IBM

Get actionable insight with security intelligence for mainframe environments
sponsored by IBM
WHITE PAPER: View this white paper to learn more about the importance of alerts with enterprise security. Find out how you can deliver integrated threat analysis, real-time alerts, and audit consolidation to manage today's growing threats. This resource discusses how you can enhance security without increasing overhead.
Posted: 08 Mar 2013 | Published: 08 Mar 2013

IBM

IBM Security Intrusion Preventions Solutions
sponsored by IBM
WHITE PAPER: Read this white paper to learn how to get industry-leading performance, preemptive threat protection, high levels of availability, and simplified deployment and management for networks.
Posted: 07 Mar 2013 | Published: 31 Dec 2012

IBM

IDC white paper: Better Identity and Access Management in the Age of Cloud Computing
sponsored by Ping Identity Corporation
WHITE PAPER: In this Q&A session, get the answers to your top identity and access management questions to learn how to achieve better IAM in the age of cloud computing.
Posted: 27 Feb 2013 | Published: 31 Aug 2012

Ping Identity Corporation

Securing SharePoint: SharePoint Security Best Practices
sponsored by Thawte Inc.
EGUIDE: This expert e-guide reveals must-see best practices for effectively securing your Microsoft SharePoint environment. Inside, learn how you can navigate tricky SharePoint security issues, including access control, security testing, policy and training, and more.
Posted: 16 May 2013 | Published: 16 May 2013

Thawte Inc.

Report: Cyber Security Attack and Incident Data
sponsored by IBM
WHITE PAPER: Uncover analysis of security attack and incident data from IBM Security Services' plethora of data collected from their tens of billions of events monitored daily for their 3,700+ clients.
Posted: 15 May 2013 | Published: 29 Mar 2013

IBM

Identity and Access Management Security Live Chat Transcript
sponsored by SailPoint Technologies
PRESENTATION TRANSCRIPT: In this presentation transcript, industry expert Peter H. Gregory answers your top questions about identity and access management (IAM) in a quick, easy to follow Q&A format.
Posted: 14 May 2013 | Published: 14 May 2013

SailPoint Technologies

Responding to—and recovering from—sophisticated security attacks
sponsored by IBM
WHITE PAPER: In this resource, find four things you can do now to keep your organization safe. Learn what you need to know to effectively respond to and recover from sophisticated security attacks by reading on now.
Posted: 14 May 2013 | Published: 28 Feb 2013

IBM

Sophos Virus Removal Tool: Free virus detection and removal
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Download your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily.
Posted: 09 May 2013 | Premiered: 09 May 2013

Sophos, Inc.

How a DNS Firewall Helps in the Battle Against Advanced Persistent Threat and Similar Malware
sponsored by Infoblox
WHITE PAPER: Uncover the role a DNS firewall can play in your security strategy for reducing loss of data due to stealthy advanced persistent threats (APTs) and other malware attacks.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

Infoblox

The Custom Defense - Your Answer to APTs
sponsored by Trend Micro
VIDEO: Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
Posted: 17 Apr 2013 | Premiered: 17 Apr 2013

Trend Micro

Email Security Technical Guide
sponsored by SearchSecurity.com
EZINE: Check out this expert guide to learn about how to handle the onslaught of e-mail attacks that plague organizations today. Discover best practices, techniques and system options that can help you stay secure.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

SearchSecurity.com

Information Security Magazine - April 2013
sponsored by SearchSecurity.com
EZINE: This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.
Posted: 03 Apr 2013 | Published: 03 Apr 2013

SearchSecurity.com

Considerations and Best Practices for Updating a Corporate BYOD Program
sponsored by Good Technology
EGUIDE: In this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
Posted: 21 Mar 2013 | Published: 21 Mar 2013

Good Technology

Types of DNS Attacks Reveal DNS Defense Tactics
sponsored by Verisign, Inc.
EGUIDE: This E-Guide from SearchSecurity.com details different types of common domain name system (DNS) attacks, the unusual behaviors they invoke, and which defense tactics work best in the given scenario. View now to learn more!
Posted: 21 Mar 2013 | Published: 21 Mar 2013

Verisign, Inc.

Cloud Endpoint Security: Considerations for Cloud Security Services
sponsored by Symantec Corporation
EGUIDE: This E-Guide from SearchSecurity.com explains the benefits of cloud endpoint security services and unveils a number of considerations to keep in mind before adoption. View now to learn more!
Posted: 26 Feb 2013 | Published: 26 Feb 2013

Symantec Corporation

APT Defense Mechanisms and Best Practices
sponsored by Infoblox
EGUIDE: Uncover the devastating affects advanced persistent threats (APTs) can have on your systems and learn a number of best practices that can help you defend against them.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

Infoblox

Solution Spotlight: How to Manage Compliance and Secure File Transfers across a WAN
sponsored by IBM and SI Architects
EGUIDE: In this expert E-Guide from searchEnterpriseWAN.com, IT expert Dan Sullivan shares the seven essential requirements for reliable file transfer and maintaining compliance with file transfer regulations. Access now and start managing your WAN more effectively.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

IBM and SI Architects

DNS Firewalls and Defense Tactics
sponsored by Infoblox
EGUIDE: Gain an in-depth look at today's most popular domain name system (DNS) attacks and the defense tactics against them. In addition, uncover how a DNS firewall can help keep your organization safe.
Posted: 18 Feb 2013 | Published: 18 Feb 2013

Infoblox
226 - 250 of 488 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement