Research Library > Technology > Security > Vulnerability Management

Vulnerability Management

In computer security, the term vulnerability is applied to a weakness in a system which allows an attacker to violate the integrity of that system. Vulnerabilities may result from weak passwords, software bugs, a computer virus or other malware, a script code injection, a SQL injection or misconfiguration.<br><br>A security risk is classified as a vulnerability if it is recognized as a possible means of attack. A security risk with one or more known instances of working and fully-implemented attacks is classified as an exploit.
Results 151 - 175 of 476Sort Results By: Published Date | Title | Company Name
White Paper Published By: IBM     Published Date: Jul 15, 2015
How IT leaders conduct vulnerability assessments, and implement proactive strategies to protect their data.
Tags : 
database vulnerability, proactive strategies, data protection, compliance, data breach
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe
Tags : 
big data security, data privacy, data protection, sensitive data, data risk management
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
How to create proactive big data security and privacy strategies
Tags : 
data security, compliance, data protection, data privacy, safeguarding information
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
This whitepaper talks about more affordable solutions for improving endpoint security, patch compliance, lifecycle management and power management within midsized organizations.
Tags : 
endpoint management, path compliance, lifecycle management, patch management, vulnerability management
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
This whitepaper is about protecting data, enabling mobility and empowering users; unified endpoint management.
Tags : 
data protection, mobility, endpoint management, governance policies, consumerization
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
This whitepaper talks about how to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
security intelligence, endpoint management, ibm security, proactive risk management, vulnerability data
    
IBM
Case Study Published By: IBM     Published Date: Jul 15, 2015
This paper evaluates the markets readiness for Zero Trust concepts and technologies, based on Forresters own market data and a custom study of the same audience.
Tags : 
intrusion prevention system, encrypted tunnels, it security, security management, network analysis
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
In this report, EMA highlights specific examples of the ways in which these converged security systems put todays more advanced capabilities to work in practical application.
Tags : 
network management, network security, enterprise management, security technology, converged security systems
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
This white paper will discuss how the X-Force team collects, analyzes and distributes threat intelligence to IBM customers, as well as how this data is used to enrich the capabilities of the IBM Security portfolio.
Tags : 
intelligence technology, security management, threat intelligence, intelligence protection, security solutions
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
Examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
fraud prevention technology, fraud loss avoidance, customer impact, fraud management costs, security management
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
This paper talks about the state of todays cyber threat landscape, current platforms for fraud management fall short, hurting customers in the process, and Trusteer's Cybercrime Prevention Architecture.
Tags : 
cybercrime, malware prevention management, malware fraud, financial fraud, security solutions
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
This paper talks about the importance of adapting to changes in fraud attacks without significant bank involvement or end user disruptions.
Tags : 
cyber threats, fraud prevention, fraud management, holistic solutions, end user disruptions
    
IBM
White Paper Published By: IBM     Published Date: Jun 16, 2015
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : 
it risk management, compliance requirements, it risk management strategies, it solutions, security breach
    
IBM
White Paper Published By: IBM     Published Date: May 07, 2015
Learn how to build a proactive threat and fraud strategy based on business analytics. Youll see extensive examples of how organizations worldwide apply IBM Business Analytics solutions to minimize the negative impact of risk and maximize positive results.
Tags : 
business analytics, risk management, threat management, fraud, proactive threat
    
IBM
White Paper Published By: IBM     Published Date: Apr 09, 2015
IBM offers insights to CIOs regarding key security essentials for enabling mobility and BYOD.
Tags : 
ibm, security, risk management, mobile device security, network security appliance
    
IBM
White Paper Published By: IBM     Published Date: Apr 09, 2015
Integrated security intelligence solutions help organizations use labor-saving automation to proactively identify security weaknesses, prioritize remediation tasks and take quick corrective action to minimize potential risks across a dynamic infrastructure.
Tags : 
ibm, integrated security, security weakness, risk management, infrastructure security
    
IBM
White Paper Published By: IBM     Published Date: Apr 09, 2015
Hybrid cloud infrastructures and mobility are changing the rules of the game for IT security professionals. Read this paper to understand the requirements to adopting a new monitoring strategy to quickly detect attacks across the infrastructure you control in your data center, as well as what you don't control in the dynamic cloud.
Tags : 
ibm, hybrid cloud, cloud computing, monitoring, detection
    
IBM
White Paper Published By: IBM     Published Date: Apr 09, 2015
Optimize the process of investigating and gathering evidence on attacks and data breaches with Network Forensics software. Learn how using full network packet capture data can deliver insight and analysis that cannot be achieved using only log source events and network flow details.
Tags : 
ibm, optimization, security, cyber crime, network security
    
IBM
White Paper Published By: IBM     Published Date: Apr 09, 2015
Discover how IBM scored 97.7% block rate against exploits and fared against other tested products in NSS Labs 2013 Network IPS Comparative Analysis.
Tags : 
ibm, nss labs, product testing, network security, computer security
    
IBM
White Paper Published By: IBM     Published Date: Apr 09, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, it security, vulnerability management, virus protection, spyware protection
    
IBM
White Paper Published By: IBM     Published Date: Apr 09, 2015
The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In todays virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others.
Tags : 
ibm, computer security, network security, malware protection, network security
    
IBM
White Paper Published By: IBM     Published Date: Apr 09, 2015
This white paper provides an overview of how cybercriminals circumvent security measures at each stage of a transactions lifecyclepre-login, during login and post-loginand offers strategies to help financial organizations combat malware-driven attacks.
Tags : 
ibm, it security, password security, malware prevention, security infrastructure
    
IBM
White Paper Published By: IBM     Published Date: Apr 09, 2015
IBM Security Trusteer solutions provide a layered security approach that can help overcome the pitfalls of two-factor authentication. They can help identify the root cause of malware and phishing attacks, defend against identity theft and thwart the evolving tactics of todays fraudsters.
Tags : 
security, ibm, two factor identification, layered security, verification
    
IBM
White Paper Published By: IBM     Published Date: Oct 10, 2013
Service engagement guide for the Virtualization Efficiency Study.
Tags : 
virtualization, it infrastructure, ves, service engagement, ibm
    
IBM
White Paper Published By: IBM     Published Date: Oct 10, 2013
Disaster recovery has become a necessary component of organizations' IT plans, but that flat IT budget makes it harder and harder to protect critical business applications. Read this white paper to learn how cloud-based business resilience can provide cost-effective alternatives to traditional disaster recovery.
Tags : 
disaster recovery, cloud computing, ibm, backup, smartcloud virtualized server recovery
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.