ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Assessments Research

  • Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities

    Sponsored by: TechTarget Security

    Expert Nick Lewis, CISSP, information security architect as Saint Louis University, covers in this e-guide how to implement and configure SSL's to ward off vulnerabilities within your organization.

  • SAAS Vulnerability Management: Choosing a Cloud-Based Service Provider

    Sponsored by: TechTarget Security

    This expert guide from SearchSecurity.com examines how to decide if SaaS vulnerability management is right for your organization and provides helpful tips for finding the right option for your environment.

  • Targeted attacks: Preparation and Mitigation

    Sponsored by: TechTarget Security

    This expert e-guide explains how you can make an effective business case for targeted attack defense. Also inside, discover what you need to know in order to change user behaviors as part of your risk mitigation strategy.

  • 6 Steps to SIEM Success

    Sponsored by: AT&T Cybersecurity

    In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.

  • Vulnerability Assessment

    Sponsored by: Symantec Corporation

    Access this whitepaper for the truth behind today's vulnerability assessment approaches, and why a clearer vision of the problem is needed for more successful security systems. Click now to find an opportunity to bridge the gap between vulnerability assessment and security management, and use actionable intelligence as effective defense.

  • PCI DSS Simplified: What You Need to Know

    Sponsored by: AT&T Cybersecurity

    Maintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.

  • The Use Case for Integrated Vulnerability Management CORE Security

    Sponsored by: Core Security Technologies

    This white paper emphasizes the importance of an effective vulnerability management infrastructure to avoid data overload challenges and explores how to stay on track by consolidating, analyzing, and prioritizing data for maximum security.

  • Three Mistakes Companies Make When It Comes to Vulnerability Management

    Sponsored by: Core Security Technologies

    In this resource, get 3 self-assessment questions to establish whether or not your approach to vulnerability management is truly successful at mitigating future security risks.

  • Gamania Group tightens security to strengthen game development capability

    Sponsored by: Hewlett Packard Enterprise

    Inside this white paper, read up on a gaming software company that was looking to expand in the market, but first turned to automated security management tools to ensure compliance and customer trust before moving forward.

  • Implementing an Effective Vulnerability Management Program

    Sponsored by: Tenable

    Access this white paper to gain insight into best practices for continuous vulnerability management. Find out how you can ensure security of your systems and why you should be implementing continuous vulnerability management.

  • Ballarat Grammar Secures BYOD with HP Sentinel SDN

    Sponsored by: Hewlett Packard Enterprise

    In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.

  • eBook: Data Security in the E-discovery Process

    Sponsored by: Dell and VMware

    In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.

  • Symantec Intelligence Report - June 2013

    Sponsored by: Symantec Corporation

    This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.

  • Symantec Intelligence Report – May 2013

    Sponsored by: Symantec Corporation

    Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.

  • Symantec Internet Security Threat Report

    Sponsored by: Symantec Corporation

    This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!

  • Creating the Ultimate Security Platform

    Sponsored by: IBM

    This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.

  • AlienVault Unified Security Management: Complete Security Visibility

    Sponsored by: AT&T Cybersecurity

    AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.

  • Practitioners Guide to Establishing a SOC Webinar

    Sponsored by: AT&T Cybersecurity

    This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).

  • Expect More From Your SIEM

    Sponsored by: AT&T Cybersecurity

    Unlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. During this session, we'll cover a few common problems with SIEM technologies, and how you can avoid them. You'll walk away with a new perspective on an old problem – reducing the cost of security visibility.

  • Practitioner's Guide to Establishing an SOC

    Sponsored by: AT&T Cybersecurity

    This white paper provides an overview of how to evaluate the security controls needed to establish a Security Operation Center (SOC), along with what data a SOC needs to quickly detect and respond to a breach.

  • Next-Generation Vulnerability Management

    Sponsored by: SAINT Corporation

    This crucial paper takes an in-depth look at how proper vulnerability management can protect business operations, mitigate risks, and improve overall IT management. Discover the latest solutions and strategies for ensuring your data is secure from attacks.

  • Managing Web Security in an Increasing Challenging Threat Landscape

    Sponsored by: TechTarget Security

    This resource offers guidance to help your organization manage web security in an increasingly dangerous threat landscape. Learn how cybercriminals are targeting web-based vulnerabilities and see what you can do to stay safe by reading on now.

  • Report: Cyber Security Attack and Incident Data

    Sponsored by: IBM

    Uncover analysis of security attack and incident data from IBM Security Services' plethora of data collected from their tens of billions of events monitored daily for their 3,700+ clients.

  • The Custom Defense - Your Answer to APTs

    Sponsored by: Trend Micro

    Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).

  • Information Security Magazine - April 2013

    Sponsored by: TechTarget Security

    This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.