Vulnerability Assessments Research
-
Web Application Security: Automated Scanning versus Manual Penetration Testing
Sponsored by: LogicalisThis paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
-
Implementing a "Smart IPS": IANS Working Knowledge Series
Sponsored by: SourcefireThe LA Times faced challenges securing its internal network and complying with PCI to address both issues they decided to implement an IPS they develop selection criteria, investigated several solutions, and ultimately selected Sourcefire.
-
3 Key Components of a Risk-Based Security Plan
Sponsored by: Foundstone, Inc.This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
-
A Comprehensive Best Practice Approach to Business Resilience and Risk Mitigation
Sponsored by: IBMThis white paper serves as a comprehensive, best-practices approach to business resilience and risk mitigation. Common types of risk and the steps organizations must take to develop an effective risk mitigation strategy are discussed.
-
e-Book: Chapter 2 - Building Bridges between IT Shops, Legal Teams and Security Staff
Sponsored by: Symantec CorporationThis e-book provides expert information on how to bridge the gap between IT management, security staff, and legal terminology.
-
Oracle Global IT (GIT) Streamlined Security
Sponsored by: Qualys, Inc.With QualysGuard Enterprise, Oracle GIT Security can monitor the company’s global vulnerability management process, track remediation, and validate policy compliance.
-
Security Beyond Corporate Boundaries: Using Citrix Application Delivery to Protect Corporate Information
Sponsored by: CitrixEnsuring your data security goes beyond the implementation of firewalls and spyware. This white paper discusses key information on virtualization deployment, and offers tips to better manage your disaster recovery enviroment.
-
Acquire a global view of your organization's security state: the importance of security assessments
Sponsored by: IBM Software GroupSecurity assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.
-
The importance of security assessments
Sponsored by: IBMThis white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.
-
Drive business value with innovation for security defense
Sponsored by: IBMThis white paper details an integrated approach to security that can help your company address security threats while supporting compliance and protecting data, Internet-based systems, physical environments and applications.
-
Extend Business Reach with a Robust Security Infrastructure
Sponsored by: IBM Software GroupThis white paper discusses the advantages of a security management solution designed to deliver integrated, comprehensive solutions across a heterogeneous environment.
-
7 Key Factors to Software Protection
Sponsored by: ArxanThis white paper explores the magnitude and types of software piracy threats and details the seven key application security factors that must be considered during the development process.
-
Online Demo - Vulnerability Management & Policy Compliance Overview
Sponsored by: Qualys, Inc.Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
-
CORE IMPACT 6.0
Sponsored by: Core Security TechnologiesFor organizations that need to ensure the security of critical or sensitive systems, CORE IMPACT is a must-have tool. This Information Security Review examines CORE IMPACT and highly recommends it as an effective security device.
-
AppDetective
Sponsored by: Application Security, Inc.Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.
-
Service Management with AppManager
Sponsored by: SUSESign up now for AppManager in Action—a series of webinars presented by our product pros and designed specifically for our customers.
-
What's New in Group Policy Administrator 5.0
Sponsored by: SUSEManaging Group Policy Objects (GPOs) effectively is essential to increasing operational integrity and compliance with auditors.
-
NetIQ Security Solutions for iSeries Trial
Sponsored by: SUSENetIQ Security Solutions for iSeries offer proven protection to hundreds of customers on thousands of servers, providing simplified auditing, vulnerability management and security administration for your iSeries and AS/400 systems.
-
VigilEnt Policy Center 4.2 Trial
Sponsored by: SUSEVigilEnt Policy Center is the most comprehensive solution for developing, implementing and managing policies, standards and procedures from any department within your organization.
-
Directory and Resource Administrator 7.5 Trial
Sponsored by: SUSENetIQ's Directory and Resource Administrator provides advanced delegation and robust, policy-based administration capabilities that improve the security and efficiency of your Microsoft Windows environment.
-
Ensuring VoIP Quality of Service
Sponsored by: SUSECompanies are managing VoIP to ensure high availability and call quality, so the ability to ensure Quality of Service (QoS) is extremely important for users.
-
AppManager 6.0.2 Trial
Sponsored by: SUSEThe NetIQ AppManager Suite product (AppManager Suite) enables IT organizations to meet their service level commitments while maximizing staff efficiency, with deep real-time diagnostics.
-
Introducing AppManager 6.0
Sponsored by: SUSESign up now for AppManager in Action—a series of webinars presented by our product pros and designed specifically for our customers.
-
Addressing the Insider Threat with NetIQ Operational Change Control Solutions
Sponsored by: SUSEDownload "Addressing the Insider Threat with NetIQ Operational Change Control Solutions" to get the expert advice you need to build a comprehensive management system that reduces and eliminates the risk of an insider threat.
-
Getting Started: Performing an Audit
Sponsored by: GFI SoftwareGFI LANguard N.S.S. automates the process of a security audit & easily identifies common vulnerabilities within your network in a short time.