IT Management  >   Systems Design and Development  >   Testing  >   Systems Testing  >  

Vulnerability Testing

RSS Feed   
Vulnerability Testing Reports
 
The Synack Value
sponsored by Synack
DATA SHEET: As business environments become more complex, traditional penetration testing becomes unable to protect against today’s threats. To address this issue, Synack developed a ‘smart’ penetration testing platform, which combines crowdsourced human talent with AI. Download this data sheet to learn more and see how it compares to traditional pen testing.
Posted: 22 May 2020 | Published: 22 May 2020

Synack

E-Guide: VM in the Cloud
sponsored by SearchSecurity.com
EGUIDE: Before you move services to the cloud, you must understand how the change in risk will affect your existing security strategy. View this expert resource now to gain best practices for cloud risk management and explore the importance of revisiting risk assumptions, pros and cons of aggregation, tips for pen testing cloud environments, and more.
Posted: 01 Feb 2012 | Published: 31 Jan 2012

SearchSecurity.com

Lessons from the Field: How are Skilled Testers Infiltrating?
sponsored by Dell SecureWorks
WEBCAST: In this webcast, hear from some of Secureworks’ most skilled testers, Nate Drier and Jared McLaren, as they talk about lessons learned from some of their most challenging engagements and the trends they are seeing with clients and their defense practices.
Posted: 09 Mar 2020 | Premiered: Mar 9, 2020

Dell SecureWorks

Web and Mobile Application Security Testing Solution Brief
sponsored by WhiteHat Security
PRODUCT OVERVIEW: According to the NTT 2020 Global Threat Intelligence Report, 55% of all attacks last year were application specific. Named a leader in a recent Gartner Magic Quadrant report, WhiteHat offers an application security testing bundle – designed to automate testing across the entire DevOps lifecycle. Download this solution brief to learn more.
Posted: 30 Jun 2020 | Published: 30 Jun 2020

WhiteHat Security

Automated Penetration Testing; Can IT Afford Not To?
sponsored by Core Security Technologies
WHITE PAPER: This paper contains an overview of penetration testing, a summary of vulnerabilities that can be revealed through penetration testing, and the business and technical benefits of performing penetration testing across your infrastructure.
Posted: 18 Jan 2007 | Published: 01 Jan 2007

Core Security Technologies

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Online Demo - Vulnerability Management & Policy Compliance Overview
sponsored by Qualys, Inc.
SOFTWARE DEMO: Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
Posted: 09 Apr 2007 | Premiered: 09 Apr 2007

Qualys, Inc.

The importance of security assessments
sponsored by IBM
WHITE PAPER: This white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM

Putting Security on Auto-Pilot: What Works, What Doesn't
sponsored by SearchSecurity.com
EBOOK: This technical guide examines the pros, cons, and unknowns of automated penetration testing, from how best to use one to the components of your security system that will still require human intervention.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

SearchSecurity.com

Justification and ROI for Automated Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This paper will help you justify the need for an automated penetration testing product and demonstrate the positive Return on Investment (ROI) that can be achieved.
Posted: 19 Sep 2005 | Published: 01 Sep 2005

Core Security Technologies
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info