HR Hero Your Employment Law Resource
 

software vulnerability management

Results 1 - 13 of 13Sort Results By: Published Date | Title | Company Name
Published By: Flexera     Published Date: Sep 16, 2016
Download this white paper to learn more about these three steps to securing software patches: Play to strengths and know your weaknesses Prioritize for Bottom Line Value Design a Process to Support Desired Outcomes
Tags : 
software patch, patch management, third-party patching, software vulnerability management, vulnerability intelligence, enterprise risk, flexera, risk reduction
    
Flexera
Published By: HP - Enterprise     Published Date: Aug 25, 2011
This white paper details how hybrid app security enables organizations to resolve critical security issues faster and cheaper than any other technology
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Aug 31, 2011
New headlines provide ongoing evidence that IT Security teams are losing the battle against attackers, reinforcing the need to address the security of enterprise applications.This Analyst Insight reviews several practical steps you can take to get started now.
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp
    
HP - Enterprise
Published By: Kaseya     Published Date: Mar 01, 2019
Three common types of software make you more vulnerable than you realize. While complete and thorough vulnerability management is next to impossible, a few simple steps go a long way toward reducing risk. Download this ebook to discover what steps to take to begin evolving away from patch management toward software and vulnerability management. The hidden threat in securing your infrastructure from vulnerabilities lies with ITís difficulty in managing third-party software. 2017 was billed as the worst on record for cybersecurity. No doubt, the continued rise of modern threat vectors has IT on high alert. In essence, IT professionals view their role as responsible for keeping the door shut. However, even with IT administrators keenly aware that most exploits can be averted simply by keeping the environment current, the task is no small feat and often isnít done as well as it needs to be.
Tags : 
    
Kaseya
Published By: GFI Software     Published Date: May 18, 2012
GFI LanGuard provides a complete network security overview with minimal administrative effort. Why use GFI LanGuard? Download this free trial to experience the benefits!
Tags : 
gfi software, languard, free trial, network security scanner, vulnerability management tool, network auditing, automated patching
    
GFI Software
Published By: Flexera     Published Date: Sep 08, 2016
This white paper will discuss the key elements of Software Vulnerability Management and how a properly deployed solution based on Vulnerability Intelligence will help organizations to maintain compliance and further secure their IT systems from breaches, attacks and data loss
Tags : 
    
Flexera
Published By: Flexera     Published Date: Jun 14, 2016
How much does your organization know about the software vulnerabilities that put data and users at risk? Chances are it is less than you think. Software vulnerability management can significantly reduce enterprise risk, and this paper offers a risk reduction plan, demonstrates why vulnerability management is important today, and offers eye-opening statistics as to the nature and breadth of the issue. It is not surprising that keeping data secure and keeping users safe continues to challenge organizations of every size and type. There has been an explosion in the number of applications used to conduct business in recent years. This multidimensional expansion includes continued growth in mobile devices and enterprise application spending exposing new attack surfaces that malware can prey upon.
Tags : 
software, vulnerability, intelligence, data, statistics, application, attacks, action strategy
    
Flexera
Published By: GFI Software     Published Date: Apr 05, 2011
GFI LANguard provides a complete network security overview with minimal administrative effort. Why use GFI LANguard? Download this free trial to experience the benefits!
Tags : 
gfi software, languard, free trial, network security scanner, vulnerability management tool, network auditing, automated patching
    
GFI Software
Published By: Flexera     Published Date: Apr 17, 2019
This white paper can help you close the gaps that can expose your organization to security breaches.
Tags : 
    
Flexera
Published By: Lumension     Published Date: Feb 07, 2014
Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?
Tags : 
lumension, java vulnerabilities, unpatched vulnerabilities, blacklist order, third-party software, endpoint devices, data-security solutions, web content
    
Lumension
Published By: Core Security     Published Date: Aug 21, 2009
This IDC white paper examines key trends in the vulnerability management and assessment (VA&M) market and identifies the value of penetration testing as part of a comprehensive security methodology.
Tags : 
vulnerability management, security management, idc, vulnerability, vulnerability assessment, security audit, auditing, security
    
Core Security
Published By: GFI     Published Date: Jul 09, 2007
This white paper identifies the problems encountered in addressing network security risks through vulnerability management. It describes how automated vulnerability management contributes to compliance with industry standards such as the Payment Card Industry Data Security Standard (PCI DSS) and assists you in proactively identifying security weaknesses before these are exploited.
Tags : 
security software, pci, payment card, credit card, compliance, pci compliance, pci data security, vulnerability
    
GFI
Published By: GFI     Published Date: Jul 09, 2007
This white paper highlights why organizations need to implement event log auditing as an integral part of their security policy to meet industry standards such as the Payment Card Industry Data Security Standard (PCI DSS).
Tags : 
security software, pci, payment card, credit card, compliance, pci compliance, pci data security, vulnerability
    
GFI
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Social Networks:
Employers Forum
facebook
Twitter
YouTube
© 2019 BLR®—Business & Legal Resources. All rights reserved. 800-274-6774


Infinite Menus, Copyright 2006, OpenCube Inc. All Rights Reserved.