IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Vulnerability Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Vulnerabilities
DEFINITION: Process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based on risk and cost. VM consists of a number of specific steps such as: asset management, auditing, remediation, and reporting. This process is continuous and creates a closed feedback loop for ongoing network threat management.
Vulnerability Management Reports
51 - 75 of 648 Matches Previous Page  |  Next Page
Build a Strong Security Foundation with the Right Endpoint Protection
sponsored by ESET
WHITE PAPER: This white paper describes one endpoint protection solution that has proven to provide a strong foundation.
Posted: 12 Mar 2015 | Published: 31 Dec 2014

ESET

Security Lessons Learned from 2014
sponsored by ESET
WEBCAST: This webcast discusses some of the most prevalent threats of 2014 and the lessons learned from them.
Posted: 12 Mar 2015 | Premiered: Dec 31, 2014

ESET

Endpoint Security for OS X
sponsored by ESET
WHITE PAPER: This white paper introduces a comprehensive OS X security system that provides you with mixed environment endpoint security.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ESET

Enhanced Mobile Endpoint Security
sponsored by ESET
WHITE PAPER: This white paper describes a mobile endpoint security system that gives you anti-theft protection, drive security, application control and more.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ESET

10 Ways to Tell its Time to Change Your Antivirus Software
sponsored by ESET
WEBCAST: This webcast addresses the question of whether you need to change your anti-virus software, and if so what to change it to.
Posted: 10 Mar 2015 | Premiered: Mar 10, 2015

ESET

Guard Your DNS with Better Protection
sponsored by Efficientip
WHITE PAPER: This white paper introduces a comprehensive, efficient DNS protection system.
Posted: 10 Mar 2015 | Published: 31 Dec 2014

Efficientip

Stop DDoS Attacks with DNS Protection
sponsored by Efficientip
WHITE PAPER: Access this white paper now to read about effective DNS protection and to learn how you can shield yourself from DDoS attacks.
Posted: 09 Mar 2015 | Published: 31 Dec 2014

Efficientip

How Hybrid DNS Can Save Your Security
sponsored by Efficientip
WHITE PAPER: This white paper suggests how you can protect your web site security with a hybrid DNS system.
Posted: 06 Mar 2015 | Published: 31 Dec 2014

Efficientip

Accurate, Effective Fraud Prevention
sponsored by IBM
WHITE PAPER: This white paper describes an example of an airtight fraud prevention system.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM

Enhance Your Malware Protection
sponsored by IBM
WHITE PAPER: This white paper describes a malware protection that can accurately identify even the most advanced malware.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM

Case Study: A Global 1000 Enterprise Adapts Its Security
sponsored by IBM
WHITE PAPER: Read this exclusive report to discover how a global 1000 company successfully adapted their security for the BYOD era.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM

Stepping up the battle against advanced threats
sponsored by IBM
WHITE PAPER: This white paper examines how and why enterprises have failed to protect themselves against advanced threats and gives suggestions for better security.
Posted: 06 Mar 2015 | Published: 31 Jan 2015

IBM

Cyber Security Roadmap
sponsored by ESET
WHITE PAPER: This white paper presents a clear, easy-to-follow roadmap to creating comprehensive security on a modest budget.
Posted: 06 Mar 2015 | Published: 06 Mar 2015

ESET

Hybrid Cloud Model Enhances DNS Security
sponsored by Efficientip
WHITE PAPER: This white paper suggests one way to prevent DNS compromises – a hybrid cloud DNS server.
Posted: 05 Mar 2015 | Published: 31 Dec 2014

Efficientip

Survey Reveals the Danger of DNS Attacks
sponsored by Efficientip
WHITE PAPER: This survey on DNS attacks reveals how powerful DNS attacks are and what securities are most effective against them.
Posted: 05 Mar 2015 | Published: 30 Jun 2014

Efficientip

Cyber Risk Report 2015 - Executive Summary
sponsored by Hewlett-Packard Company
WHITE PAPER: The HP Cyber Risk Report 2015 provides a broad overview of the threat landscape and how hackers operate.
Posted: 05 Mar 2015 | Published: 28 Feb 2015

Hewlett-Packard Company

2015 Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This 2015 cyber risk report provides a broad view of the 2014 threat landscape and gives you the information you need to protect your business.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

Hewlett-Packard Company

Closing the Hacker's Open Door: Strengthening Mobile & App Security
sponsored by IBM
WEBCAST: In this webcast, learn how to stop apps with malware signatures before they find their way onto your network.
Posted: 05 Mar 2015 | Premiered: Jan 7, 2015

IBM

5 Reasons Why Your DNS Protection Isn't Doing Enough
sponsored by Efficientip
WHITE PAPER: This white paper lists 5 ways that traditional security solutions fail against DNS attacks.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

Efficientip

The Complete Guide To Google Apps Security
sponsored by Datto, Inc.
WHITE PAPER: In this helpful guide, explore the available additional protection services and technologies for securing data stored in Google's cloud.
Posted: 04 Mar 2015 | Published: 07 Jan 2015

Datto, Inc.

The Financial Impact of Advanced Persistent Threats
sponsored by IBM
WHITE PAPER: This detailed report shows you just how detrimental APTs can be.
Posted: 03 Mar 2015 | Published: 01 May 2014

IBM

Uncover the Top Ten Database Threats That Could Affect Your Business
sponsored by Imperva
WHITE PAPER: This white paper highlights the top ten threats that affect traditional databases as well as Big Data technologies.
Posted: 03 Mar 2015 | Published: 31 Dec 2014

Imperva

Data Breach Protection Requires New Barriers
sponsored by Websense
EGUIDE: Access this eGuide to hear from security experts why a shift in perspective is needed, and why organizations can build better data breach protection by assuming the occurrence of a breach.
Posted: 02 Mar 2015 | Published: 02 Mar 2015

Websense

DDoS Response Playbook
sponsored by Imperva
WHITE PAPER: This white paper will help you create a response plan for one of the most widespread threats – DDoS attacks.
Posted: 02 Mar 2015 | Published: 02 Mar 2015

Imperva

The Four Key Elements of Fraud Prevention
sponsored by IBM
WHITE PAPER: This white paper helps you stop fraud by outlining the four key elements of holistic fraud prevention.
Posted: 02 Mar 2015 | Published: 31 Aug 2014

IBM
51 - 75 of 648 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement