IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability ManagementReports
26 - 50 of 477 Matches Previous Page  | Next Page
SANS Survey on Application Security Programs and Practices
sponsored by Hewlett-Packard Company
WHITE PAPER: This SANS report pinpoints where the vulnerability gaps lie in today's application security programs. Click through for key recommendations on how to address these issues.
Posted: 04 Apr 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

Mobile Application Security Study
sponsored by Hewlett-Packard Company
WHITE PAPER: In this resource, unveil the major vulnerabilities created when mobile application developers speed through to meet deadlines instead of integrating top security measures.
Posted: 04 Apr 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

Managing Security Risks and Vulnerabilities
sponsored by IBM
WHITE PAPER: This white paper highlights the ways in which organizations can focus on protecting high-value assets and provide a scalable, cost-effective, integrated security process the entire IT environment.
Posted: 03 Apr 2014 | Published: 31 Jan 2014

IBM

Rackspace and NetIQ - A Success Story
sponsored by NetIQ
WEBCAST: This webcast features one organization's experience with a streamlined identity and access management (IAM) solution that simplifies user provisioning across physical and virtual infrastructures.
Posted: 02 Apr 2014 | Premiered: Feb 28, 2013

NetIQ

Chalk Talk: NetIQ Cloud Access
sponsored by NetIQ
WEBCAST: This webcast highlights a cloud access management solution that easily integrates with your user directory and Microsoft Office 365. Learn how you can seamlessly manage user provisioning to virtualized business applications and resources.
Posted: 02 Apr 2014 | Premiered: Apr 2, 2014

NetIQ

Enterprise Strategy Group Improving Incident Response with NetCitadel
sponsored by NetCitadel
WEBCAST: In this video, Enterprise Strategy Group's Jon Oltsik looks at the weakness of detection-focused security strategies doomed to failure. Responding to threats is what really keeps firms out of the headlines, and organizations need to prepare properly.
Posted: 02 Apr 2014 | Premiered: Apr 2, 2014

NetCitadel

Cloud-based Enterprise Identity Management Using OAuth
sponsored by Forum Systems
WHITE PAPER: This resource highlights an authentication and authorization solution that offers protection beyond the username and password-only level.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Forum Systems

Multifactor Authentication: Removing Risk While Simplifying Processes
sponsored by NetIQ
WHITE PAPER: In this resource, learn how multi-factor authentication brings that extra line of defense your organization needs to protect against malicious hackers.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

NetIQ

Cisco 2014 Annual Security Report
sponsored by Cisco
WHITE PAPER: This information-packed resource acts as a guide for developing a robust security approach given today's issues with trust, threat intelligence, and varying industry trends. Click through to explore key findings, as well as recommendations for your next steps.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

Cisco

What CISOs Need to Know About Cloud Computing
sponsored by CloudPassage
WHITE PAPER: This resource highlights key security differences in traditional infrastructures versus the cloud. Click through to learn how to leverage existing methods to create a well-rounded cloud security approach.
Posted: 31 Mar 2014 | Published: 06 Jan 2014

CloudPassage

6 Steps to Protect Your Intellectual Property
sponsored by Websense
WHITE PAPER: In this report, find out what data you must protect and why, uncover six steps for deploying data security controls, and learn more about the concept of data loss prevention (DLP) as a defense.
Posted: 31 Mar 2014 | Published: 31 Dec 2013

Websense

Why Java Exploits Remain a Top Security Risk
sponsored by Websense
WHITE PAPER: Learn how the huge number of Java versions in active use makes it vulnerable to attack. Illustrated are the risks from the use of Java and alternatives on how to address these risks, using internal process, Websense solutions or a mixture of both.
Posted: 31 Mar 2014 | Published: 31 Dec 2013

Websense

World Wide Technology Accelerates and Streamlines Access Management
sponsored by NetIQ
WHITE PAPER: This case study shares one organization's experience with an access management solution that enabled 8x faster integration with new services so that users could count on reliable, secure access to business applications anytime, anywhere.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

NetIQ

Fortinet’s Solution for the Enterprise Campus: High Performance Next Generation Firewall
sponsored by Fortinet, Inc.
WHITE PAPER: This whitepaper explores major trends behind next-generation firewalls and how you can ensure network security while still enabling your employees.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

Fortinet, Inc.

Managing Security Risks and Vulnerabilities
sponsored by IBM
WHITE PAPER: This informative whitepaper takes a look current threat landscape and what you need to do to protect your organization.
Posted: 28 Mar 2014 | Published: 31 Jan 2014

IBM

Presentation Transcript: Setting the Groundwork for IAM in the Cloud
sponsored by OpenIAM
TRANSCRIPT: In this resource, Phil Cox, consultant at SystemExperts Corporation, explains how to successfully extend your identity and access management (IAM) solution to the cloud.
Posted: 27 Mar 2014 | Published: 27 Mar 2014

OpenIAM

DDOS Mitigation a Key Component in Network Security
sponsored by Ixia
WHITE PAPER: This expert e-guide explores why DDoS prevention needs to be a main part of your network security plan.
Posted: 27 Mar 2014 | Published: 27 Mar 2014

Ixia

Leverage Security Intelligence to Protect Sensitive Healthcare Data
sponsored by IBM
WHITE PAPER: This guide explores the importance of end-to-end system visibility and security intelligence for healthcare organizations, and how to combat a full range of security threats.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

IBM

Podcast: Setting the Groundwork for IAM in the Cloud
sponsored by OpenIAM
PODCAST: This podcast will address three strategic issues that need to be identified within an organization to ensure that your IAM strategy will succeed in the cloud.
Posted: 26 Mar 2014 | Premiered: Mar 18, 2014

OpenIAM

Cloud Servers: New Risk Considerations
sponsored by CloudPassage
WHITE PAPER: This white paper reveals the major risks associated with cloud servers.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

CloudPassage

Leverage Security Intelligence for Retail
sponsored by IBM
WHITE PAPER: This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
Posted: 26 Mar 2014 | Published: 31 Oct 2013

IBM

Setting the Groundwork for IAM in the Cloud
sponsored by OpenIAM
WEBCAST: This presentation will address three strategic issues that need to be identified within an organization to ensure that your IAM strategy will succeed in the cloud.
Posted: 25 Mar 2014 | Premiered: Mar 18, 2014

OpenIAM

Security intelligence is the smart way to keep the cloud safe
sponsored by IBM
WHITE PAPER: This white paper will examine the intelligence capabilities necessary for gaining visibility into, and control over, cloud security. It also demonstrates how an integrated suite of end-to-end security intelligence solutions can help meet cloud security needs.
Posted: 25 Mar 2014 | Published: 31 Oct 2013

IBM

Using Privacy as a Business Differentiator
sponsored by Peak 10
WHITE PAPER: Click through for a discussion on contextual privacy, and what businesses should do in order to balance new opportunities with data protection.
Posted: 24 Mar 2014 | Published: 11 Feb 2014

Peak 10

Secunia Vulnerability Review 2014
sponsored by Secunia
WHITE PAPER: This guide reviews vulnerabilities for 2014 and discusses key figures and facts from a global IT security perspective.
Posted: 21 Mar 2014 | Published: 26 Feb 2014

Secunia
26 - 50 of 477 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement