IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management Reports
26 - 50 of 560 Matches Previous Page  |  Next Page
Exposing the Unknown: How Sandboxing Technology Fights Modern Threats
sponsored by Checkpoint Software Technologies
WHITE PAPER: This white paper takes a look at the modern threat landscape, including zero-day attacks and advanced persistent threats (APT), and the consequences of not protecting your company's data and networks. Access now to learn how traditional sandboxing compares to advanced sandbox solutions.
Posted: 11 Feb 2016 | Published: 30 Jun 2015

Checkpoint Software Technologies

Using Veeam and VMware vSphere Tags for Advanced Policy-driven Data Protection
sponsored by Veeam Software
WHITE PAPER: This white paper defines activities that will protect workloads based on the “desired state” that their users will define for their workloads.
Posted: 11 Feb 2016 | Published: 31 Dec 2015

Veeam Software

Broadening Your VDI Horizon Beyond Thin Client Devices
sponsored by Dell, Inc. and Intel®
EGUIDE: This exclusive e-guide details how you can move beyond traditional thin client devices for VDI access to either existing, reconfigured PCs or mobile devices. Access now and you'll learn how most non-thin-client access uses exactly the same mechanisms as thin clients.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell, Inc. and Intel®

Intelligent Spear Phishing Protection: Stopping Highly Targeted Attacks
sponsored by Cloudmark
WHITE PAPER: In this brief paper, discover how today's spear phishing attacks operate, as well as how they evade conventional defenses. Learn how to employ protection against these highly targeted attacks with next-gen context analysis and real-time reporting dashboards.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

Cloudmark

Protecting Your Data in a New Generation Virtual and Physical Environment
sponsored by Acronis
WHITE PAPER: Read this white paper to learn how you can easily and safely protect your data in a new generation virtual and physical IT environment, eliminate single point of failure, and the need for multiple backup solutions.
Posted: 25 Jan 2016 | Published: 15 Oct 2014

Acronis

Success That Scales: Delivering Security Intelligence for Organizations of All Sizes
sponsored by IBM
WHITE PAPER: This white paper explains how an integrated security intelligence platform with scalable capabilities, allowing enterprises to stay a step ahead of security threats. Read on to learn how this platform can enable you to scale out and up and deploy new capabilities such as integrated risk management, vulnerability management, and incident forensics.
Posted: 22 Jan 2016 | Published: 31 Oct 2014

IBM

The Trust Cost of a Data Breach & How to Prepare
sponsored by AllClear ID
WHITE PAPER: This report summarizes findings for a sampling of 160 data breach insurance claims, 155 of which involved the exposure of sensitive personal data in a variety of business sectors. The objective for this study is to you understand the true impact of data insecurity.
Posted: 20 Jan 2016 | Published: 16 Dec 2015

AllClear ID

Cyber Security Intelligence Index for Retail
sponsored by IBM
WHITE PAPER: This security intelligence report examines the types of threats that retailers face and gives advice for staying safe. Access it now to learn how you can protect your retail organization from advanced attacks.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

IBM

The Curious Case of API Security: Solving the Top 11 API Threats
sponsored by Axway
WHITE PAPER: This resource delves into the top threats facing APIs, exploring how these attacks are carried out and how you can thwart them. Read on to learn how to keep your APIs secure.
Posted: 08 Dec 2015 | Published: 08 Dec 2015

Axway

Successfully Integrating DevOps Teams Within Your Organization
sponsored by evident.io
EGUIDE: Access this exclusive e-guide to discover expert recommendations for building a proactive DevOps team within your organization and how you can successfully integrate security with DevOps.
Posted: 30 Nov 2015 | Published: 30 Nov 2015

evident.io

An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 01 Oct 2015 | Premiered: Jul 1, 2015

WhiteHat Security

Bolster Your Web Application Security
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines how you can give your web applications the security they need, and protect against vulnerabilities or other threats.
Posted: 01 Oct 2015 | Published: 06 Jul 2015

WhiteHat Security

Securing Apps from the First Line of Code
sponsored by WhiteHat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 01 Oct 2015 | Published: 28 Oct 2014

WhiteHat Security

Web Security: Fighting Off Zero Day Attacks
sponsored by WhiteHat Security
WEBCAST: Join web security guru Robert Hansen in this webinar for an in-depth explanation of the many vulnerabilities you may not have considered, and to discover how you can better protect your newly-built websites and applications. View now to learn how to stop attacks like Heartbleed, SQL injection, command injection, and more.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security

Vulnerability Chaining: Evaluating Low and Moderate Threat Vulnerabilities with Threat Risk Modeling
sponsored by WhiteHat Security
WEBCAST: In this webcast, vulnerability guru Caleb Watt of the Threat Research Center will walk you through how threat modeling can keep your company safe from dangerous attack chaining.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security

Vulnerability Remediation: If you Ranked It, You Should Have Put a Patch on It
sponsored by WhiteHat Security
WEBCAST: Access this webcast now for an in-depth review of the various web security vulnerabilities you need to protect yourself from, and also discover a step-by-step guide for remediating these threats. View it now to uncover the truth about web security.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security

Best Practices for Cloud-Based Identity and Access Management
sponsored by Radiant Logic, Inc.
EGUIDE: In this expert e-guide, you'll learn the 6 best practices for implementing cloud-based IAM in your organization to avoid security vulnerabilities. View now to learn how to assess your IAM as a service (IAMaaS) options.
Posted: 11 Sep 2015 | Published: 03 Sep 2015

Radiant Logic, Inc.

Is Third-Party Access the Next IAM Frontier?
sponsored by Radiant Logic, Inc.
EGUIDE: This expert e-guide explores the lack of IAM security for third parties and the steps to take to secure your data. Access this exclusive resource now to rectify lapses in third-party security before vulnerabilities can be exploited.
Posted: 11 Sep 2015 | Published: 02 Sep 2015

Radiant Logic, Inc.

Understanding the Risks of Content Management Systems
sponsored by IBM
WHITE PAPER: This white paper explores the dangers of CMS platforms and explains how you can take advantage of CMS without putting your security at risk.
Posted: 11 Sep 2015 | Published: 31 May 2015

IBM

How you can defend against criminal attacks originating from the Deep Web
sponsored by IBM
WHITE PAPER: This white paper explores the depths of the Deep Web, using attack data to examine what kinds of attacks originate there and how you can defend against them.
Posted: 09 Sep 2015 | Published: 31 Jul 2015

IBM

Securing Information in the New Digital Economy
sponsored by Oracle Corporation
WHITE PAPER: This white paper shows you a new view of security by focusing on the risks inside your network.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Oracle Corporation

Mobile Malware: The Hackers' New Playground
sponsored by IBM
WHITE PAPER: This comprehensive white paper outlines how to prevent security breaches in mobile apps. Read on to learn about the intricacies of mobile malware, mobile threat management, how iOS is still vulnerable to attacks, and much more.
Posted: 13 Jul 2015 | Published: 13 Jul 2015

IBM

Secure Your Cloud Against Exposures: How Vulnerability Management Platforms Help
sponsored by Alert Logic
WHITE PAPER: This commissioned study, conducted by Forrester Research on behalf of Alert Logic, examines how vulnerability management platforms actively/continuously scan apps and data in public cloud environments to beyond current security technologies. Read on to review how to close visibility gaps in your cloud security model.
Posted: 11 Feb 2016 | Published: 27 Jan 2016

Alert Logic

Cybercrime Exposed: The Hidden Economy of Cybercrime-as-a-Service
sponsored by Intel
WHITE PAPER: Access this resource for an inside look at the thriving economy of "cybercrime-as-a-service."
Posted: 07 Jan 2016 | Published: 31 Dec 2013

Intel

What to Look for in Vulnerability Management
sponsored by SearchSecurity.com
EBOOK: This Buyer's Essentials guide helps InfoSec pros, like you, assess and purchase vulnerability management tools. It explains how they work and highlights key features you should look for.
Posted: 07 Oct 2015 | Published: 07 Oct 2015

SearchSecurity.com
26 - 50 of 560 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement