Vulnerability Management Research
-
Reconfigure Your Antimalware Strategy to Boost Endpoint Security For Advanced Threat Protection
Sponsored by: OpenText Security SolutionsThis expert e-guide explains why reconfiguration of your current antimalware strategy is all it takes to mitigate new trends in cyber-attacks.
-
Web Browser Security Features Make Attacks Harder
Sponsored by: TechTarget SecurityThis e-guide from SearchSecurity.com explores the features Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome are developing that are making the job of the attacker much harder.
-
SSL Certificate Management: Avoiding Common Mistakes
Sponsored by: Symantec CorporationThis expert e-guide explores the most common mistakes in implementing and managing SSL certificates, and how to avoid them.
-
Vulnerability Assessment
Sponsored by: Symantec CorporationAccess this whitepaper for the truth behind today's vulnerability assessment approaches, and why a clearer vision of the problem is needed for more successful security systems. Click now to find an opportunity to bridge the gap between vulnerability assessment and security management, and use actionable intelligence as effective defense.
-
Salvation Army Protects the Integrity of Data and Global Brand
Sponsored by: LumensionIn this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.
-
Website Security Threat Report, Part Two
Sponsored by: Symantec CorporationThis website security threat report focuses on the threats that impact your website and online business. Access this resource to understand the threat landscape and understand how you can protect your company and your infrastructure.
-
Security Intelligence – Is Security a Battle You Can Win
Sponsored by: IBMThis white paper details the need for IT teams to discover the benefits of security intelligence (SI), and how it can simplify the complex security environment for better security analytics.
-
Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
Sponsored by: Core Security TechnologiesThis white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
-
The Use Case for Integrated Vulnerability Management CORE Security
Sponsored by: Core Security TechnologiesThis white paper emphasizes the importance of an effective vulnerability management infrastructure to avoid data overload challenges and explores how to stay on track by consolidating, analyzing, and prioritizing data for maximum security.
-
Cutting Complexity – Simplifying Security
Sponsored by: KasperskyKaspersky Lab's latest whitepaper, "Cutting Complexity – Simplifying Security" looks at how the latest IT Systems Management solutions can simplify and automate a vast range of routine IT management tasks.
-
The Azzurri IT Leader Peer-to-Peer Opinion Exchange 2013
Sponsored by: AzzurriThis resource features an opinion exchange on the trend in mobile device use for business workload, whether it's bring-your-own-device (BYOD), choose-your-own-device (CYOD), or don't-bring-your-own-device (DBYOD), and what this means for data security.
-
Three Mistakes Companies Make When It Comes to Vulnerability Management
Sponsored by: Core Security TechnologiesIn this resource, get 3 self-assessment questions to establish whether or not your approach to vulnerability management is truly successful at mitigating future security risks.
-
Reducing Your Patch Cycle to Less Than 5 Days
Sponsored by: TenableThis informative webcast explores the challenges of vulnerability management and creative solutions to help you fully leverage your vulnerability management process and reduce your patch cycle.
-
Outcome Based Security Monitoring in a Continuous Monitoring World
Sponsored by: TenableIn this white paper, you will discover a five step approach that can help commercial and government organizations achieve their goals of continuous monitoring programs. Learn how this approach leverages distributed scanning, sniffing and log analysis to perform flexible, scalable and near real-time vulnerability detection for any size of network.
-
Gamania Group tightens security to strengthen game development capability
Sponsored by: Hewlett Packard EnterpriseInside this white paper, read up on a gaming software company that was looking to expand in the market, but first turned to automated security management tools to ensure compliance and customer trust before moving forward.
-
Implementing an Effective Vulnerability Management Program
Sponsored by: TenableAccess this white paper to gain insight into best practices for continuous vulnerability management. Find out how you can ensure security of your systems and why you should be implementing continuous vulnerability management.
-
Ballarat Grammar Secures BYOD with HP Sentinel SDN
Sponsored by: Hewlett Packard EnterpriseIn this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
-
Protecting Your Website With Always On SSL
Sponsored by: Symantec CorporationThis white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
-
eBook: Data Security in the E-discovery Process
Sponsored by: Dell and VMwareIn this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
-
Storage Magazine: How to improve your virtual server storage setups
Sponsored by: IBM.In this expert e-zine, featuring server virtualization and storage expert, David Davis, you will gain insight through the process of tweaking virtual server storage setups and discover ten tips that provide practical guidance you can use today to improve the performance of several virtual storage systems.
-
Symantec Intelligence Report - June 2013
Sponsored by: Symantec CorporationThis Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
-
Symantec Intelligence Report – May 2013
Sponsored by: Symantec CorporationKeeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
-
Symantec Internet Security Threat Report
Sponsored by: Symantec CorporationThis report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
-
Creating the Ultimate Security Platform
Sponsored by: IBMThis whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
-
AlienVault Unified Security Management: Complete Security Visibility
Sponsored by: AT&T CybersecurityAlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.