Research Library > Technology > Security > Vulnerability Management

Vulnerability Management

In computer security, the term vulnerability is applied to a weakness in a system which allows an attacker to violate the integrity of that system. Vulnerabilities may result from weak passwords, software bugs, a computer virus or other malware, a script code injection, a SQL injection or misconfiguration.<br><br>A security risk is classified as a vulnerability if it is recognized as a possible means of attack. A security risk with one or more known instances of working and fully-implemented attacks is classified as an exploit.
Results 176 - 200 of 476Sort Results By:Published Date | Title | Company Name
White Paper Published By: McAfee     Published Date: Mar 08, 2013
McAfee Virtual Patching for Databases makes perfect sense for closing the window of risk, while saving dollars and minimizing business disruption.
Tags : 
database security, database patching, database compliance, database security patches, virtual patching
    
McAfee
White Paper Published By: McAfee     Published Date: Mar 08, 2013
Protect sensitive information in emerging computing models such as virtualized environments. Learn how to leverage the same security architecture to provide more effective and more efficient data security across dedicated database servers as well.
Tags : 
database security, virtual database environments, database virtualization, database activity monitoring, vm to vm transactions
    
McAfee
White Paper Published By: McAfee     Published Date: Mar 08, 2013
Databases dont take the day off. Neither do we. McAfee security experts remain focused on keeping your sensitive information safe and available while helping your company ensure compliance with internal policies and industry regulations.
Tags : 
database security, database compliance, database virtual patching, database breach, application control
    
McAfee
White Paper Published By: McAfee     Published Date: Mar 08, 2013
McAfee Data Center Security Suite for Database delivers all the capabilities needed to secure your databases for reliable SOX compliance, with minimal impact on system performance or the productivity of your IT organization.
Tags : 
database security, database compliance, sox compliance, sox audit, database activity monitoring
    
McAfee
White Paper Published By: McAfee     Published Date: Mar 08, 2013
Compliance does not automatically equate to security. A company may be compliant with a host of regulatory requirements, while its databases remain exposed and vulnerable. Learn how McAfee Database Security can help prevent such vulnerabilities.
Tags : 
database security, database compliance, native dbms auditing, database protection, database password audit
    
McAfee
Webinar Published By: McAfee     Published Date: Mar 08, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit
    
McAfee
White Paper Published By: McAfee     Published Date: Mar 08, 2013
McAfee Virtual Patching for Databases shields databases from the risk presented by unpatched vulnerabilities by detecting and preventing attempted attacks and intrusions in real time without requiring database downtime or application testing.
Tags : 
database security, database virtual patching, database vulnerability management, pci dss, hipaa
    
McAfee
White Paper Published By: McAfee     Published Date: Mar 08, 2013
McAfee Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database vulnerability manager, database compliance, mysql security, database password security
    
McAfee
White Paper Published By: McAfee     Published Date: Mar 08, 2013
McAfee Database Activity Monitoring automatically finds databases on your network, protects them with preconfigured defenses, and helps you build a custom security policy for your environment making it easier to demonstrate compliance to auditors.
Tags : 
database security, database activity monitoring, database compliance, database audit, database virtual patching
    
McAfee
White Paper Published By: McAfee     Published Date: Mar 08, 2013
With McAfee Database Security, achieving protection and compliance is easier than you might think.
Tags : 
database security, database audit, database compliance, cert, database security policy
    
McAfee
White Paper Published By: McAfee     Published Date: Mar 08, 2013
Learn about McAfee Database Security solutions, compliance and security requirements, and principles for protecting your database.
Tags : 
database security, native dbms auditing, sarbanes-oxley, pci dss, hipaa
    
McAfee
White Paper Published By: McAfee     Published Date: Mar 08, 2013
Databases store companies most valuable information assets, but in most cases theyre poorly protected. Its important to secure databases as well as or better than other systems in the enterprise. But its not that simple.
Tags : 
real-time database monitoring, database authentication, database access control, database activity monitoring, database intrusion prevention
    
McAfee
White Paper Published By: McAfee     Published Date: Mar 07, 2013
McAfee recently bridged the MySQL security gap with a unique solution that combines an open source auditing plug-in with industry-leading database security modules the McAfee MySQL Audit Plug-In.
Tags : 
securing mysql, mysql security, sql injections, mysql database, mysql audit plugin
    
McAfee
White Paper Published By: McAfee     Published Date: Mar 07, 2013
Recent surveys of IT managers revealed two commonly held beliefs: database regulations are the most challenging to comply with, and of all regulatory standards, the Payment Card Industry Data Security Standard (PCI DSS) the toughest.
Tags : 
pci dss compliance, best database security, pci security standards council, pci dss requirements, database activity monitoring
    
McAfee
White Paper Published By: McAfee     Published Date: Mar 07, 2013
HIPAA and HITECH require individually identifiable protected health information (PHI) be secured. The unfortunate reality for IT professionals is that these acts of Congress aren't prescriptive regarding what needs to be done about computer systems.
Tags : 
best database security solution, database activity monitoring, hipaa compliance, hitech compliance, phi
    
McAfee
White Paper Published By: McAfee     Published Date: Mar 07, 2013
Databases are the primary target of cyber criminals and disgruntled insiders. Traditional perimeter, network security, and built-in database security measures, offer limited protection when it comes to securing the organizations most sensitive data.
Tags : 
database security, database security compliance, database activity monitoring, access control, anti spyware
    
McAfee
White Paper Published By: McAfee     Published Date: Mar 07, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit
    
McAfee
White Paper Published By: Bit9     Published Date: Mar 07, 2013
Download this white paper and learn how to use a progressive, three-step approach to build trust, monitor activity and tailor protection to your enterprise and build an adaptive application control framework.
Tags : 
security, risk management, roi, cost reduction, enterprise
    
Bit9
White Paper Published By: Bit9     Published Date: Mar 07, 2013
In this whitepaper, Industry Analyst Frost and Sullivan examines todays advanced threat landscape and recommends that organizations adopt a new approach to server security that is based on trust.
Tags : 
data breaches, data center, security, cyber threats, server
    
Bit9
Case Study Published By: Arbor     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : 
ddos, market trends, infonetics, ddos prevention, arbor networks
    
Arbor
White Paper Published By: Arbor     Published Date: Mar 06, 2013
This Frost & Sullivan white paper identifies what organizations need to know to protect their intellectual property and prepare for unexpected data breaches.
Tags : 
cyber threats, security, ddos, data breaches, atlas
    
Arbor
White Paper Published By: EMC Corporation     Published Date: Mar 06, 2013
This technology profile examines how IT decision makers expectations and approaches are evolving to address increasing demands for higher levels of IT availability from their organizations and clients.
Tags : 
high availability, continuous availability, business continuity, risk management, data center
    
EMC Corporation
White Paper Published By: Arbor Networks     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : 
ddos, cyber attacks, research, enterprise, mobile
    
Arbor Networks
White Paper Published By: Arbor Networks     Published Date: Mar 06, 2013
This Frost & Sullivan white paper identifies what organizations need to know to protect their intellectual property and prepare for unexpected data breaches.
Tags : 
cyber threats, security, ddos, data breaches, atlas
    
Arbor Networks
White Paper Published By: Neustar     Published Date: Feb 27, 2013
Consumer phone data is changing every day, from the device to the subscriber which leaves you at risk for violating the TCPA. Neustar Information Services provides you with authoritative phone data to help you mitigate risk and increase efficiency.
Tags : 
tcpa, compliance, risk, authoritative phone data, auto dialing restrictions
    
Neustar
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.