Vulnerability Management White Papers

In computer security, the term vulnerability is applied to a weakness in a system which allows an attacker to violate the integrity of that system. Vulnerabilities may result from weak passwords, software bugs, a computer virus or other malware, a script code injection, a SQL injection or misconfiguration.<br><br>A security risk is classified as a vulnerability if it is recognized as a possible means of attack. A security risk with one or more known instances of working and fully-implemented attacks is classified as an exploit.
Results 1 - 25 of 387Sort Results By: Published Date | Title | Company Name
By: Bit9     Published Date: Apr 16, 2015

You can’t open a newspaper or visit an online news site these days without some mention of a cyber-attack or data breach. These activities are becoming more prevalent, and as a result, the reporting of these activities is also on the rise.

Tags : data breach, breach preparation, cyber attack, data security, threat detection, security, application security, hacker detection
    
By: Bit9     Published Date: Apr 16, 2015

With the number of advanced attacks increasing every day—most undiscovered through traditional detection and response solutions—truly hunting for threats within your environment can be a laborious task. To combat this, enterprises must focus on prioritizing endpoint data collection over detection, leveraging comprehensive threat intelligence, and expanding detection beyond the moment of compromise.

Tags : advanced threat hunting, traditional detection, endpoint data collection, threat intelligence, threat detection, access control, firewalls, hacker detection
    
By: IBM     Published Date: Apr 09, 2015

IBM offers insights to CIOs regarding key security essentials for enabling mobility and BYOD.

Tags : ibm, security, risk management, mobile device security, network security appliance, security management, vulnerability management, mobile device management
    
By: IBM     Published Date: Apr 09, 2015

Integrated security intelligence solutions help organizations use labor-saving automation to proactively identify security weaknesses, prioritize remediation tasks and take quick corrective action to minimize potential risks across a dynamic infrastructure.

Tags : ibm, integrated security, security weakness, risk management, infrastructure security, application security, firewalls, network security appliance
    
By: IBM     Published Date: Apr 09, 2015

Hybrid cloud infrastructures and mobility are changing the rules of the game for IT security professionals. Read this paper to understand the requirements to adopting a new monitoring strategy to quickly detect attacks across the infrastructure you control in your data center, as well as what you don't control in the dynamic cloud.

Tags : ibm, hybrid cloud, cloud computing, monitoring, detection, it security, data center security, business continuity
    
By: IBM     Published Date: Apr 09, 2015

Optimize the process of investigating and gathering evidence on attacks and data breaches with Network Forensics software. Learn how using full network packet capture data can deliver insight and analysis that cannot be achieved using only log source events and network flow details.

Tags : ibm, optimization, security, cyber crime, network security, it security, access control, anti spyware
    
By: IBM     Published Date: Apr 09, 2015

Discover how IBM scored 97.7% block rate against exploits and fared against other tested products in NSS Labs 2013 Network IPS Comparative Analysis.

Tags : ibm, nss labs, product testing, network security, computer security, application security, anti spyware, firewalls
    
By: IBM     Published Date: Apr 09, 2015

The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.

Tags : ibm, it security, vulnerability management, virus protection, spyware protection, firewalls, hacker detection, internet security
    
By: IBM     Published Date: Apr 09, 2015

The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others.

Tags : ibm, computer security, network security, malware protection, network security, security organization, anti spyware, firewalls
    
By: IBM     Published Date: Apr 09, 2015

This white paper provides an overview of how cybercriminals circumvent security measures at each stage of a transaction’s lifecycle—pre-login, during login and post-login—and offers strategies to help financial organizations combat malware-driven attacks.

Tags : ibm, it security, password security, malware prevention, security infrastructure, anti spyware, anti virus, application security
    
By: IBM     Published Date: Apr 09, 2015

IBM Security Trusteer solutions provide a layered security approach that can help overcome the pitfalls of two-factor authentication. They can help identify the root cause of malware and phishing attacks, defend against identity theft and thwart the evolving tactics of today’s fraudsters.

Tags : security, ibm, two factor identification, layered security, verification, phishing, malware, identity theft
    
By: Kaspersky     Published Date: Feb 05, 2015

This paper gives information about how Automatic Exploit Prevention significantly reduces the risk of infection from widespread malware, or more targeted attacks using exploits – even when a zero-day vulnerability is used.

Tags : benefits to enterprise it security, exploit prevention, protection from exploits, software attacks, anti spam, anti spyware, anti virus, application security
    
By: McAfee     Published Date: Jan 20, 2015

The exact number of AETs is unknown, but there may be hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall. Get this free report today.

Tags : advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.

Tags : mobile device security, byod, application security, data security, network security, access control, ssl, secure instant messaging
    
By: Arbor Networks     Published Date: Mar 13, 2015

As the world becomes more connected, it is no longer enough for enterprises to react once an alert indicates an attacker is inside the network. Instead, with continuous packet capture and threat feeds followed by analysis, it is now possible to hunt the attackers and locate them versus waiting for an alert.

Tags : arbor, arbor networks, hackers, cyberattacks, internet security, intrusion prevention, network security, anti virus
    
By: CDW     Published Date: Feb 24, 2015

All organizations require software systems to conduct daily operations. These strategic enterprise assets are often acquired or created in isolation of each other as an organization grows, particularly for those that provide services rather than physical products. Over time, these systems become complex, overlapping and highly dependent on one another, so more effort must be expended to discover the full effects of any system change. The ability of an entity to update, replace or improve the overall capabilities of the enterprise can become severely impaired. Moreover, support and administrative costs for these critical assets inevitably grow to be a major burden. Add to all this the need to control licensing, follow the organization’s policies and ensure security for the internal network, and it becomes clear that some manner of oversight is required for the enterprise to be successful.

Tags : sam, software asset management, strategic enterprise assets, license utilization, cloud based computing, network security, software compliance, vulnerability management
    
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, hacker detection
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, email security, encryption
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Symantec     Published Date: Nov 19, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, business continuity
    
By: Symantec     Published Date: Nov 19, 2014

The top ten tips on how to secure your business against cyber risk and threats.

Tags : tips for cyber resilience, anti spam, anti spyware, anti virus, firewalls, hacker detection, internet security, intrusion detection
    
By: Symantec     Published Date: Nov 19, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Symantec     Published Date: Nov 19, 2014

This report examines a wide range of business costs, including expense outlays for detection, escalation, notification, and after-the-fact (ex-post) response of a data security breach.

Tags : the cost of a data breach, business costs of a data breach, responses to a data breach, firewalls, internet security, intrusion detection, intrusion prevention, data protection
    
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.