Research Library > Technology > Security > Vulnerability Management

Vulnerability Management

In computer security, the term vulnerability is applied to a weakness in a system which allows an attacker to violate the integrity of that system. Vulnerabilities may result from weak passwords, software bugs, a computer virus or other malware, a script code injection, a SQL injection or misconfiguration.<br><br>A security risk is classified as a vulnerability if it is recognized as a possible means of attack. A security risk with one or more known instances of working and fully-implemented attacks is classified as an exploit.
Results 351 - 375 of 476Sort Results By: Published Date | Title | Company Name
White Paper Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
New technologies used in Web 2.0 applications have increased the volume and complexity of network traffic. More than ever, businesses must deploy new methods of monitoring and controlling these applications in order to discover and mitigate new hidden security threats.
Tags : 
fortinet, web application security, web application control, application threats, web 2.0
    
Fortinet, Inc.
White Paper Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
This white paper describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization's network from being used to attack another organization.
Tags : 
fortinet, fortigate dos protection, malicious traffic, denial of service, ddos protection
    
Fortinet, Inc.
White Paper Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.
Tags : 
fingerprint authentication, identity management, identity protection, data security, identity theft
    
DigitalPersona UK
White Paper Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper examines the common misconceptions about full disk encryption.
Tags : 
digital persona, encryption, myths, fingerprint authentication, identity management
    
DigitalPersona UK
White Paper Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : 
end point security, digitalpersona, saas, security as a service, cloud
    
DigitalPersona UK
Webinar Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security
    
Trend Micro, Inc.
Webinar Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security
    
Trend Micro, Inc.
White Paper Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security
    
Trend Micro, Inc.
White Paper Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security
    
Trend Micro, Inc.
White Paper Published By: Blue Coat Systems     Published Date: Jul 07, 2011
This report examines the interactions of malware ecosystems, including user behavior, malware hosting sites and delivery networks and offers effective strategies to build better defenses.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses
    
Blue Coat Systems
White Paper Published By: NetIQ     Published Date: Jul 07, 2011
Controlling distribution of passwords to highly sensitive environments in no longer enough; learn more about Privileged identity management (PIM) and what you can do to monitor and control your business to finest level of detail possible.
Tags : 
netiq, pci compliance, file integrity monitoring, fim, report on compliance
    
NetIQ
White Paper Published By: NetIQ     Published Date: Jul 07, 2011
In this white paper, we will examine some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program to solve today's needs and support new requirements in the future.
Tags : 
netiq, pci compliance, sustainable, sustainability, file integrity monitoring
    
NetIQ
Webinar Published By: IBM Corporation     Published Date: Jun 30, 2011
The demonstrations included in this menu interface show how IBM Tivoli Provisioning Manager solutions can help you manage the complete life cycle of your data center and distributed resources from initial provisioning to patching and configuration maintenance to resource re-purposing or end of life.
Tags : 
energy management, tivoli, disaster prevention, infrastructure, bms
    
IBM Corporation
White Paper Published By: StorageCraft® Technology Corporation     Published Date: Jun 23, 2011
StorageCraft® ShadowProtect® provides superior disaster recovery, data protection and migration services. In this whitepaper find out what else StorageCraft® to help you protect your customers.
Tags : 
storagecraft, shadowprotect, backup, recovery, networks
    
StorageCraft® Technology Corporation
White Paper Published By: StorageCraft® Technology Corporation     Published Date: Jun 23, 2011
Protecting data is becoming more and more important and new technologies are making backup and recovery strategies more viable to smaller businesses. Now is the time to create an effective BDR plan or review one already in place - before disaster strikes.
Tags : 
storagecraft, recovery, backup, cloud, strategies
    
StorageCraft® Technology Corporation
White Paper Published By: StorageCraft® Technology Corporation     Published Date: Jun 23, 2011
When it comes to data protection and recovery, many businesses are not as safe as they believe. Read on to find out what you should consider when creating your backup and disaster recovery plan.
Tags : 
storagecraft, recovery, backup, cloud, strategies
    
StorageCraft® Technology Corporation
White Paper Published By: StorageCraft® Technology Corporation     Published Date: Jun 21, 2011
Use ShadowProtect® to save time and money and find more time to go fishing.
Tags : 
fishing, storagecraft, shadowprotect, stf consulting, teamwork
    
StorageCraft® Technology Corporation
White Paper Published By: Lumension     Published Date: May 03, 2011
Why fixing third-party application vulnerabilities is at the core of sound government information security-and how to make sure patch management is optimizing your security posture.
Tags : 
patch management, security, lumension, government security, cyber attack
    
Lumension
White Paper Published By: Shavlik Technologies     Published Date: Apr 19, 2011
This paper will look at ways federal government agencies can maintain a strong and effective patch management program by seamlessly integrating third party patch management solutions into existing SCCM infrastructure.
Tags : 
shavlik, patch management, sccm, vulnerability management, security
    
Shavlik Technologies
White Paper Published By: Dell SecureWorks     Published Date: Apr 17, 2011
Read this whitepaper to understand how combining the iSensor Intrusion Prevention appliance with 24x7 monitoring and administration by Dell SecureWorks' certified security experts to deliver exceptional cyber threat protection for your midsize organization.
Tags : 
isensor, secureworks, safeguard, firewalls, cyberthreats
    
Dell SecureWorks
White Paper Published By: Shavlik Technologies     Published Date: Apr 14, 2011
This whitepaper will cover the challenges of relying exclusively on either AV or patch and configuration management for threat resistance and why a combined approach is the best option.
Tags : 
shavlik, anti-malware, patch management, configuration management, virtualization
    
Shavlik Technologies
White Paper Published By: Shavlik Technologies     Published Date: Apr 14, 2011
This paper will look at ways federal government agencies can maintain a strong and effective patch management program by seamlessly integrating third party patch management solutions into existing SCCM infrastructure.
Tags : 
shavlik, patch management, sccm, vulnerability management, security
    
Shavlik Technologies
White Paper Published By: Shavlik Technologies     Published Date: Apr 14, 2011
How can an organization manage both their physical environment and their virtual environment without doubling up on the work, missing critical patches on offline virtual machines, or even missing patches on the virtual machines they are not even aware of?
Tags : 
shavlik, patch management, virtual machine, physical, network patching
    
Shavlik Technologies
Webinar Published By: Shavlik Technologies     Published Date: Apr 14, 2011
This webinar will cover the challenges of relying exclusively on either AV or patch and configuration management for threat resistance and why a combined approach is the best option.
Tags : 
shavlik, anti-malware, patch management, configuration management, virtualization
    
Shavlik Technologies
White Paper Published By: Dell SecureWorks     Published Date: Apr 11, 2011
Read this whitepaper to understand how Dell SecureWorks can help your midsize organization improve security, increase operational efficiency and demonstrate compliance with regulatory requirements, allowing you to focus on the priorities and strategic projects that drive your business.
Tags : 
dell secureworks, internet security, compliance, regulatory compliance, vulnerability
    
Dell SecureWorks
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.