ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vulnerability Assessments Research

  • E-Guide: Bringing Value to Application Monitoring Through SIM

    Sponsored by: TechTarget Security

    This expert e-guide describes the value that security information and management systems (SIMs) can bring to both application monitoring and real-time security. See how you can get the most out of SIM by reading on now.

  • Check the network before moving to the cloud

    Sponsored by: TechTarget Security

    Before considering a move to the cloud, it’s important to ensure that your network is free of vulnerabilities that could put your data at risk. This expert resource offers tips on how to make sure your network is secure before extending the network infrastructure. View now to uncover key processes and tools to help detect configuration mistakes.

  • E-Guide: Expert insights to application security testing and performance

    Sponsored by: TechTarget Security

    Two of the biggest challenges in an organization’s application security strategies are testing and integrating best practices within the application lifecycle. In this E-Guide, readers will learn best practices for testing injection integrating security measures into the application lifecycle.

  • E-Guide: Remediating IT vulnerabilities: Expert Tips

    Sponsored by: TechTarget Security

    This expert E-Guide uncovers 3 quick ways you can remediate IT vulnerabilities and discusses best practices for improved vulnerability management.

  • APT Defense Mechanisms and Best Practices

    Sponsored by: Infoblox

    Uncover the devastating affects advanced persistent threats (APTs) can have on your systems and learn a number of best practices that can help you defend against them.

  • Web Browser Security Features Make Attacks Harder

    Sponsored by: Symantec Corporation

    In this expert e-guide, find an overview of the new security capabilities that are being built into popular web browsers and learn how these security features make it more difficult for cybercriminals to carry out attacks. Read on to learn more now.

  • Cybersecurity Information Sharing: Establishing New Protocols

    Sponsored by: BMC Software, Inc.

    This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more.

  • Information Security Magazine – November 2012

    Sponsored by: Dell SonicWALL

    Consult this enlightening online magazine to learn more about how you can keep up with the rapidly changing technology trends. Find out to defend against adversaries and create a strong enterprise that's prepared for a myriad of attacks.

  • STATE OF DNS AVAILABILITY REPORT

    Sponsored by: Verisign, Inc.

    View this informative white paper to learn more about the domain name system vulnerabilities that you should keep in mind for the busy season. Find out some of the challenges of availability and the impact downtime can have on your enterprise by accessing this resource.

  • 2012 - Endpoint Security Best Practices Survey

    Sponsored by: Symantec Corporation

    Consult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.

  • Patch management: Fixing vulnerabilities before they are exploited

    Sponsored by: GFI LanGuard

    Software updates are constant, and it's one of the most challeneging and resource-intensive tasks for an IT department. Securing vulnerabilities remains one of the most essential updates for IT pros. View this informative white paper to learn more about effective patch managment.

  • HP Mobile Application Security

    Sponsored by: Hewlett Packard Enterprise

    Watch this informative video to learn more about some of the dangers that mobile apps pose to your business. Protecting everything from customer to enterprise data is an essential step to a secure environment. Discover the many facets of mobile security by tuning in now.

  • HP Fortify on Demand - Enterprise Software Security in the Cloud

    Sponsored by: Hewlett Packard Enterprise

    HP is changing the enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research and security events and vulnerabilities, they develop an unparalleled visibility. Access this informative white paper to learn more about security-as-a-service (SaaS) and how it can help your organization.

  • HP Fortify Software Security Center- Proactively Eliminate Risk in Software

    Sponsored by: Hewlett Packard Enterprise

    Learn how HP can transform your enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research, you can ensure unparalleled visibility across security assets. With over 90 percent of vulnerabilities in software, this is a resource you certainly don't want to overlook.

  • Rewriting the Rules of Patch Management

    Sponsored by: IBM

    By implementing more patches, software vendors are keeping pace with malware exploits. Consult this informative white paper to learn more about patch management and how it can benefit your business. Virtually eliminate the risks to your company by following these steps.

  • Webroot Secure Anywhere - Endpoint Protection

    Sponsored by: OpenText Security Solutions

    Threats are becoming more sophisticated and frequent than ever before, as a result businesses require a revolutionary approach to endpoint malware protection. Access this informative white paper to learn how Webroot is using its services to keep security up-to-date and effective.

  • Protect citizen data with IBM Rational software

    Sponsored by: IBM

    Digital and connected government information improves processes and makes accessibility simple for public sector agencies. This white paper outlines how agencies can keep their information available without risking sensitive data.

  • Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance

    Sponsored by: Rapid7

    Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.

  • Software Security Analysis: Control Flow Security Analysis with McCabe IQ

    Sponsored by: McCabe Software, Inc.

    Read this white paper to learn how comprehensive security analysis equips you with the proper insight into the structure of your software code to identify and resolve possible security holes

  • Channel executives see need to bolster hospital IT security

    Sponsored by: Hewlett Packard Enterprise

    Regardless of the size of the institution, hospitals need a sufficient IT security system in place. This E-guide explores why channel professionals and VARs should not only understand hospital vulnerabilities but also be able to convince customers that risk mitigation is worth the price.

  • Why Free Patch Management Tools Could Cost You More

    Sponsored by: Lumension

    This white paper explores why so-called "free" patch management solutions could really end up costing your organization more in the long run.

  • The CISOs Guide to Measuring IT Security

    Sponsored by: Lumension

    In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.

  • Presentation Transcript: Reduce the Cost of Being Secure by Building Security into your Development Process

    Sponsored by: IBM

    In this presentation transcript, explore the importance of application security and the business case for building security in from the start.  Find out how your development tools can assist you in meeting your security objectives.

  • Compliance and Risk Management: Factoring compliance as part of your risk management equation

    Sponsored by: IBM

    Enterprises often struggle with integrating IT security and compliance efforts into an overall corporate risk management program. Inside this e-book, learn how to implement effective policies for GRC, audits and much more.

  • Software Security Delivered in the Cloud

    Sponsored by: Hewlett Packard Enterprise

    HP Fortify on Demand is a Security-as-a Service (SaaS) testing solution that allows organizations to quickly, accurately and affordably test the security of their applications without the need to manage or install any software. View now to learn more about this cloud-based, automated service.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.