IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management Reports
51 - 75 of 621 Matches Previous Page  |  Next Page
The New Security Paradigm: Changes you Must Make
sponsored by Symantec Corporation
WHITE PAPER: This important white paper offers security resiliency as the paradigm shift that must occur, forcing you to rethink the way you approach security, utilize what you already have, identify the gaps, and move from reaction to prediction.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

Symantec Corporation

Sleeping Through the Alarm: What Breaches Should be Telling Us, and Why the Message is Missed
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper reports the findings of an extensive SafeNet survey of security professionals around the world, offering insights into current market realities and their implications for security executives.
Posted: 12 Dec 2014 | Published: 11 Nov 2013

SafeNet, Inc.

Enterprises Seek Greater Security Through Network Transparency
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Kevin Beaver lists 3 major ways that you can better know and secure your enterprise networks as they grow larger and more complex than ever before.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

6 Vulnerabilities of the Retail Payment Ecosystem
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explains the risks involved in each step of the retail payment process and provides practical solutions for each, including manipulating software updates, exploiting weak passwords, and more.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SafeNet, Inc.

Incident Response: How to Fight Back, A SANS Survey
sponsored by Hewlett-Packard Company
WHITE PAPER: This SANS survey on incident response taps into the collective knowledge of 259 security professionals in 19 industries and 13 countries to help you to understand how other companies respond to cyber incidents and how you can improve your own response.
Posted: 11 Dec 2014 | Published: 01 Feb 2015

Hewlett-Packard Company

Quantifying the Business Value of HP TippingPoint
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP white paper applies the experience of real HP TippingPoint customers to quantify its savings and demonstrate pay back in the first year.
Posted: 11 Dec 2014 | Published: 30 Dec 2013

Hewlett-Packard Company

Next-Generation Firewalls and IPS: Why You Need Both
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP white paper shows how next-generation firewalls and next-generation intrusion prevention systems are complementary security solutions that work together to secure your network.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

Hewlett-Packard Company

Collaborative Defense – HP Security Research
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper from HP Security Research demonstrates why collaboration is essential in defending businesses from cyber attacks and how it can work.
Posted: 11 Dec 2014 | Published: 01 Feb 2015

Hewlett-Packard Company

Plan to Migrate Before Windows Server 2003 End of Life
sponsored by Hewlett-Packard Company
EGUIDE: View this expert e-guide to examine your options when migrating away from WS 2003 and how to overcome challenges. Discover how to assess which upgrade avenue is right to pursue for your workload and what is waiting for you if you choose not to migrate.
Posted: 10 Dec 2014 | Published: 04 Nov 2014

Hewlett-Packard Company

Plan to Migrate before Windows Server 2003 End of Life
sponsored by Hewlett-Packard Company
EGUIDE: In this expert e-guide, explore why it is crucial to begin your migration away from WS 2003 now and what your options are for an upgrade. View a pros and cons list of several server and OS avenues you can take. Read on to discover IT professional insights to assess which solution is right for your organization's workload and budget.
Posted: 05 Dec 2014 | Published: 05 Nov 2014

Hewlett-Packard Company

Win the Race Against Time to Stay Ahead of Cybercriminals
sponsored by IBM
WHITE PAPER: Discover how IBM Security QRadar Incident Forensics can help enterprises investigate and gather evidence on breaches.
Posted: 03 Dec 2014 | Published: 08 Jul 2014

IBM

Websense® Security Labs™: 8 Security Predictions for 2015
sponsored by Websense
WHITE PAPER: This must-read resource from Websense presents the top 8 security predictions for 2015.
Posted: 01 Dec 2014 | Published: 18 Nov 2014

Websense

Are You Fully Prepared for Shellshock?
sponsored by Dell Software
WEBCAST: Join this webinar for technical insight into Shellshock, and learn what you can do to protect networks and Linux-based devices from attacks.
Posted: 25 Nov 2014 | Premiered: Nov 25, 2014

Dell Software

Take Inventory of your Open Source Software Security
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why enterprise development teams should create in-house repositories to mitigate the risks of applications built on open source code.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

Update Your Application Security Policy After Heartbleed
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why relying solely on other parties to correctly implement and deliver software security can put enterprise and customer data at risk.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

4 Steps to Security Intelligence
sponsored by Hewlett-Packard Company
WHITE PAPER: Download this brief whitepaper to find out the four steps to security intelligence.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Hewlett-Packard Company

Protecting Your Business with a More Mature IT Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: Your ability to spot and stop cyber attacks depends on having the right security people, processes, and technology in place. HP Security Intelligence and Operations Consulting has assessed the security programs of dozens of enterprises. The results are concerning--24 percent of companies do not meet minimum requirements for security monitoring.
Posted: 20 Nov 2014 | Published: 20 Nov 2014

Hewlett-Packard Company

Network Security Intelligence Selection Buying Guide
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why network defense can make or break the success of an enterprise; and also introduces HP TippingPoint, a leader in security intelligence, as a potential solution.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

2014 Cost of Cyber Crime Study: Australia
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive whitepaper explores the economic impact of cyber-crime on Australia in 2014.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

Ponemon Cost of Cyber Crime Study: Global Report
sponsored by Hewlett-Packard Company
WHITE PAPER: Ponemon Institute's 2014 Cost of Cyber Crime Study taps into the collective experience of 257 organizations in seven countries, describing the most common and most costly types of attacks; the greatest internal and external costs; and the security technologies most effective in reducing losses.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

2014 Global Report on the Cost of Cyber Crime
sponsored by Hewlett-Packard Company
WHITE PAPER: Ponemon Institute's 2014 Cost of Cyber Crime Study taps into the collective experience of 257 organizations in seven countries, describing the most common and most costly types of attacks; the greatest internal and external costs; and the security technologies most effective in reducing losses.
Posted: 18 Nov 2014 | Published: 31 Oct 2014

Hewlett-Packard Company

Enterprise Software Security Strategies Pulse Report (SSA)
sponsored by Hewlett-Packard Company
WHITE PAPER: This survey report by Gatepoint Research explores the extent to which IT organizations employ application security testing and remediation solutions.
Posted: 18 Nov 2014 | Published: 31 Oct 2014

Hewlett-Packard Company

Addressing the Full Attack Continuum- A New Security Model For Before, During and After an Attack
sponsored by Cisco
WHITE PAPER: This important whitepaper will teach you how to develop a threat-centric security approach.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

Cisco

Cost of a Breach Rising; How to Protect Against It
sponsored by TaaSera
EGUIDE: This expert e-guide explores how the Target breach of 2013 has changed the way organizations approach security.
Posted: 01 Dec 2014 | Published: 01 Dec 2014

TaaSera

HP Security Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett-Packard Company
51 - 75 of 621 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement