Research Library > Technology > Security > Vulnerability Management

Vulnerability Management

In computer security, the term vulnerability is applied to a weakness in a system which allows an attacker to violate the integrity of that system. Vulnerabilities may result from weak passwords, software bugs, a computer virus or other malware, a script code injection, a SQL injection or misconfiguration.<br><br>A security risk is classified as a vulnerability if it is recognized as a possible means of attack. A security risk with one or more known instances of working and fully-implemented attacks is classified as an exploit.
Results 1 - 25 of 476Sort Results By: Published Date | Title | Company Name
White Paper Published By: Absolute Software     Published Date: May 14, 2014
Based on the reality of the changing workforce, Absolute Software provides the top four reasons IT should re-evaluate their endpoint protection strategies.
Tags : 
endpoint protection stategy, byod, workforce mobility, absolute software, own device
    
Absolute Software
Case Study Published By: Absolute Software     Published Date: Feb 10, 2012
The story of val Verde will help schools innovate better, streamline purchasing, increase cost-efficiencies, and ultimately, provide staff and students with a fleet of optimally running devices.
Tags : 
backup and recovery, blade servers, storage management, access control, disaster recovery
    
Absolute Software
White Paper Published By: Absolute Software     Published Date: Sep 09, 2011
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
Tags : 
absolute, end-point security, data breach protection, authentication, organizational policy
    
Absolute Software
Webinar Published By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple® iOS devices (iPhone®, iPod® Touch, iPadT).
Tags : 
absolute, intel, laptop, saas, lock down
    
Absolute Software
Webinar Published By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : 
absolute, intel, laptop, saas, lock down
    
Absolute Software
Webinar Published By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : 
absolute, intel, laptop, saas, lock down
    
Absolute Software
Webinar Published By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : 
absolute, intel, laptop, saas, lock down
    
Absolute Software
Webinar Published By: Absolute Software     Published Date: Sep 06, 2011
Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.
Tags : 
absolute, intel, laptop, saas, lock down
    
Absolute Software
Webinar Published By: Absolute Software     Published Date: Sep 06, 2011
View this flash demo to see Absolute in action and how you can monitor installed software/hardware and track location and take action if device is lost or stolen.
Tags : 
absolute, computrace, secure, tracking, security
    
Absolute Software
White Paper Published By: Adobe     Published Date: Apr 25, 2016
This white paper explores the question: How can IT govern and protect content in such ad hoc and semistructured environments?
Tags : 
data security, data management, mobile security, application security, vulnerability management
    
Adobe
White Paper Published By: Adobe     Published Date: Apr 25, 2016
In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer?
Tags : 
enterprise mobility, mobile application security, it management, vulnerability management
    
Adobe
White Paper Published By: Adobe     Published Date: Apr 25, 2016
This white paper explores the question: How can IT govern and protect content in such ad hoc and semistructured environments?
Tags : 
data security, data management, mobile security, application security, vulnerability management
    
Adobe
White Paper Published By: Adobe     Published Date: Apr 25, 2016
In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer?
Tags : 
enterprise mobility, mobile application security, it management, vulnerability management
    
Adobe
White Paper Published By: Aerohive Networks     Published Date: May 06, 2015
Learn how organizations can easily and securely on-board a range of users and devices by issuing individual pre-shared keys on the same SSID.
Tags : 
wi-fi, security, network security, bandwith limitations, ssid
    
Aerohive Networks
White Paper Published By: AirTight Networks     Published Date: Nov 30, 1999
Making corporate data accessible through Wi-Fi networks means intruders and other unwanted visitors can easily access such networks if proper precautions and tools aren't used to protect them. This paper will discuss best practices in all five areas to secure the enterprise network, whether wired or wireless.
Tags : 
wireless, best practices, enterprise security, wi-fi, wireless security
    
AirTight Networks
White Paper Published By: Akamai     Published Date: Mar 10, 2012
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Tags : 
security, internet security, website security, online security, cloud based security
    
Akamai
White Paper Published By: Akamai     Published Date: Mar 10, 2012
This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.
Tags : 
security, internet security, website security, online security, cloud based security
    
Akamai
Webinar Published By: AlienVault     Published Date: Aug 13, 2015
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.
Tags : 
alienvault, security, siem, hacking, threat detection
    
AlienVault
White Paper Published By: AlienVault     Published Date: Aug 13, 2015
The 2015 Magic Quadrant summarizes Gartner’s yearly analysis of the SIEM market and compares the positions of leading competitors like AlienVault. Get Gartner's complete analysis of each SIEM vendor, and learn what makes AlienVault a Visionary. Download the 2015 report.
Tags : 
alienvault, security, siem, hacking, threat detection
    
AlienVault
Webinar Published By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common browser vulnerabilities used to execute attacks, what attackers do next to take control of the system, and how to catch it before the attacker moves further into your network
Tags : 
end-user protection, cyberattacks, browser vulnerabilities, security management, modern threats
    
AlienVault
Webinar Published By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common PCI DSS compliance challenges, questions to ask as you plan and prepare, core capabilities needed to demonstrate compliance, and how to simplify compliance with a unified approach to security
Tags : 
pci, dss, compliance, alienvault, security management
    
AlienVault
White Paper Published By: AlienVault     Published Date: Aug 11, 2015
Read this paper to accelerate your evaluation of SOC tools and technology needs.
Tags : 
security operations center, soc, threat detection, soc tools, siem event correlation
    
AlienVault
White Paper Published By: AlienVault     Published Date: Aug 11, 2015
This report talks about Gartner's Magic Quadrant for SIEM in 2015
Tags : 
security information, event management, magic quadrant, gartner report, siem technology
    
AlienVault
White Paper Published By: Aomega     Published Date: Nov 06, 2006
Recent regulatory additions require that companies take proactive measures like penetration testing to enforce data privacy and integrity.  By deploying a distributed model companies can execute testing from different security levels which is important in challenging posture based on level of access.
Tags : 
regulatory compliance, compliance, data privacy, pci, data privacy
    
Aomega
White Paper Published By: Arbor     Published Date: Sep 15, 2014
DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.
Tags : 
ddos attacks, it security, application layer attacks, application security, firewalls
    
Arbor
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.