ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Assessments Research

  • Getting Started: Performing an Audit

    Sponsored by: GFI Software

    GFI LANguard N.S.S. automates the process of a security audit & easily identifies common vulnerabilities within your network in a short time.

  • Justification and ROI for Automated Penetration Testing

    Sponsored by: Core Security Technologies

    This paper will help you justify the need for an automated penetration testing product and demonstrate the positive Return on Investment (ROI) that can be achieved.

  • The Self-Defending Network

    Sponsored by: Cisco Systems, Inc.

    Your network is one of your most important business assets, and you need to protect this valuable resource from hackers, viruses, spyware, and other threats. Your business needs security that's built into every part of your network to proactively spot suspicious activity, identify threats, and adapt to new challenges quickly.

  • Borealâ„¢, the SNMP Vulnerability Test Suite

    Sponsored by: InterWorking Labs, Inc.

    Boreal allows network administrators and testers to uncover such weaknesses and accurately document any failures so the manufacturer of the faulty device can take appropriate action.

  • Boreal, the SNMP Vulnerability Test Suite

    Sponsored by: InterWorking Labs, Inc.

    Boreal, the SNMP Vulnerability Test Suite, allows network administrators and testers to verify the robustness of each of their network devices in the face of packet decoding vulnerabilities.

  • Penetration Tests

    Sponsored by: Internet Security Systems, Inc.

    A penetration test offers an invaluable and compelling way to establish a baseline assessment of security as seen from outside the boundaries the organization's network.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.