Research Library > Technology > Security > Vulnerability Management

Vulnerability Management

In computer security, the term vulnerability is applied to a weakness in a system which allows an attacker to violate the integrity of that system. Vulnerabilities may result from weak passwords, software bugs, a computer virus or other malware, a script code injection, a SQL injection or misconfiguration.<br><br>A security risk is classified as a vulnerability if it is recognized as a possible means of attack. A security risk with one or more known instances of working and fully-implemented attacks is classified as an exploit.
Results 326 - 350 of 476Sort Results By: Published Date | Title | Company Name
White Paper Published By: SEEBURGER, Inc.     Published Date: Sep 12, 2011
Read the white paper to learn five key ways MFT makes a difference for your business.
Tags : 
seeburger, mft, security, file transfer, data management
    
SEEBURGER, Inc.
White Paper Published By: SEEBURGER, Inc.     Published Date: Sep 12, 2011
Read the white paper to discover more about the true cost of "free" file sharing systems and file sharing best practices.
Tags : 
seeburger, file sharing, erp systems, file storage, security
    
SEEBURGER, Inc.
White Paper Published By: SEEBURGER, Inc.     Published Date: Sep 12, 2011
Read the white paper to find out how Managed File Transfer ensures your data flow is secure and speedy.
Tags : 
seeburger, streamline, mft, managed file transfer, network connections
    
SEEBURGER, Inc.
White Paper Published By: Absolute Software     Published Date: Sep 09, 2011
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
Tags : 
absolute, end-point security, data breach protection, authentication, organizational policy
    
Absolute Software
White Paper Published By: ESET     Published Date: Sep 07, 2011
This report presents a comparative analysis on the performance, effectiveness and usability of seven security solutions from some of the world's largest security vendors.
Tags : 
eset, security solutions for business, malware, antivirus, protection
    
ESET
Webinar Published By: ESET     Published Date: Sep 07, 2011
Protection for small and medium businesses against viruses and cybercrimes.
Tags : 
eset, black hat conference, hacking the car, malware, protection
    
ESET
Webinar Published By: ESET     Published Date: Sep 07, 2011
Learn valuable tips and techniques to fully protect your smartphone against security threats.
Tags : 
eset, gemini trojan, android phone, apps, security
    
ESET
Webinar Published By: ESET     Published Date: Sep 07, 2011
Selecting an antivirus for your small or medium business that won't slow you down.
Tags : 
eset, antivirus, security, smb, protection
    
ESET
White Paper Published By: ESET     Published Date: Sep 07, 2011
In this report, we investigate the implementation details of the malware and the ways in which it is distributed, and consider the cybercriminals' objectives.
Tags : 
eset, tdl, x64, cybercriminal, cybercrime
    
ESET
White Paper Published By: ESET     Published Date: Sep 07, 2011
This paper gives some examples of "potentially unwanted" and "potentially unsafe" applications, explaining how they differ from out-and-out malware.
Tags : 
eset, pua, potentially unwated application, software, unsafe
    
ESET
White Paper Published By: ESET     Published Date: Sep 07, 2011
A lengthy analysis that considers many of these questions, as well as discussing some of the characteristics of this fascinating and multi-faceted malicious code.
Tags : 
eset, virus, scada, plcs, stuxnet
    
ESET
Webinar Published By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple iOS devices (iPhone, iPod Touch, iPadT).
Tags : 
absolute, intel, laptop, saas, lock down
    
Absolute Software
Webinar Published By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : 
absolute, intel, laptop, saas, lock down
    
Absolute Software
Webinar Published By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : 
absolute, intel, laptop, saas, lock down
    
Absolute Software
Webinar Published By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : 
absolute, intel, laptop, saas, lock down
    
Absolute Software
Webinar Published By: Absolute Software     Published Date: Sep 06, 2011
Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.
Tags : 
absolute, intel, laptop, saas, lock down
    
Absolute Software
Webinar Published By: Absolute Software     Published Date: Sep 06, 2011
View this flash demo to see Absolute in action and how you can monitor installed software/hardware and track location and take action if device is lost or stolen.
Tags : 
absolute, computrace, secure, tracking, security
    
Absolute Software
White Paper Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
This white paper reviews the challenges with endpoint security in virtualized environments - including the inherent risks of dynamic virtual machines and the resource impact of security software such as virus-scanners in multiple guest virtual machines, on a single physical host.
Tags : 
trend micro, antivirus, virtual datacenter, enterprise security, virtual machines
    
Trend Micro Inc.
White Paper Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
Download the ESG white paper to help you identify: -Why virtualization should scare you -Security you didn't know existed -How to be confident in the cloud
Tags : 
trend micro, information security, virtualization, cloud, internet content security
    
Trend Micro Inc.
White Paper Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
Download white paper now to learn the challenges of physical consolidation, performance issues for virtualization and cloud security requirements.
Tags : 
trend micro, cloud security, virtualization, internet content security, smart protection network
    
Trend Micro Inc.
White Paper Published By: VMware     Published Date: Aug 18, 2011
This executive level paper highlights trends and findings from CIO's 2011 Global Cloud Computing Adoption survey as it relates to Security and Compliance in the virtualized datacenter.
Tags : 
vmware, cloud security, trends, virtualized datacenter, compliance
    
VMware
White Paper Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
The vulnerability of Wi-Fi and conventional wired Ethernet networks is nothing new. But the new Firesheep Wi-Fi attack tool has opened the vulnerability up to others, putting sensitive information within the easy reach of even casual hackers. Learn what you need to do to protect your company from these attacks.
Tags : 
verisign, symantec, ssl, firesheep, sidejacking attacks
    
VeriSign, Inc.
White Paper Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
This white paper will help you learn about criminals' motivations for distributing malware through the web and how they infect web servers to make distribution possible, as well as techniques administrators can use to detect when and how attackers have compromised their web server.
Tags : 
verisign, malware security report, bottom line, business protection, cybercriminals
    
VeriSign, Inc.
White Paper Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive information.
Tags : 
verisign, security solution, ssl, trust, malicious activity
    
VeriSign, Inc.
White Paper Published By: Quest Software     Published Date: Jul 28, 2011
In this white paper Quest's data protection experts offer five tips for effective backup and recovery to help you avoid the challenges that might keep you from fully protecting your virtual assets and infrastructure.
Tags : 
quest, storage virtualization, it management, systems management solutions, virtualization managemen
    
Quest Software
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.