Host Vulnerability Assessment Reports

How to Modernize Your Vulnerability Management Program
sponsored by ServiceNow
EGUIDE: Attackers have changed their focus from servers to users. As a result, security professionals should refrain from security strategy complacency, especially when it comes to their vulnerability management programs. In this e-guide, learn how to modernize your vulnerability management program to protect your organization and users.
Posted: 08 Feb 2021 | Published: 22 Oct 2019

ServiceNow

E-Guide: Remediating IT vulnerabilities: Expert Tips
sponsored by TechTarget Security
EGUIDE: This expert E-Guide uncovers 3 quick ways you can remediate IT vulnerabilities and discusses best practices for improved vulnerability management.
Posted: 10 Nov 2011 | Published: 09 Nov 2011

TechTarget Security

Ponemon - Costs and Consequences of Gaps in Vulnerability Response
sponsored by ServiceNow
WHITE PAPER: Ponemon Institute surveyed almost 3,000 IT security professionals across the globe to understand how organizations are responding to vulnerabilities. This paper presents the findings of the most recent report and compares it to the 2018 study – read on for the complete results.
Posted: 08 Feb 2021 | Published: 06 Aug 2020

ServiceNow

Information Security Magazine - April 2013
sponsored by TechTarget Security
EZINE: This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.
Posted: 03 Apr 2013 | Published: 03 Apr 2013

TechTarget Security

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

Endpoint Protection Platforms for Enterprises
sponsored by Symantec Corporation
WHITE PAPER: This guide explores a unique enterprise endpoint protection platform that encompasses a multitude of security tools.
Posted: 14 Feb 2014 | Published: 08 Jan 2014

Symantec Corporation

The Pros and Cons of SSL Decryption for Enterprise Network Monitoring
sponsored by Symantec Corporation
EGUIDE: SearchSecurity.com expert on network security, Brad Casey discusses the pros and cons of SSL decryption to determine its viability as an enterprise network monitoring aid. Read the e-guide and hear his opinion on how to use SSL decryption as an enterprise security tactic.
Posted: 17 Oct 2013 | Published: 17 Oct 2013

Symantec Corporation

Compliance and Risk Management: Factoring compliance as part of your risk management equation
sponsored by IBM
EBOOK: Enterprises often struggle with integrating IT security and compliance efforts into an overall corporate risk management program. Inside this e-book, learn how to implement effective policies for GRC, audits and much more.
Posted: 14 Nov 2011 | Published: 14 Nov 2011

IBM

The Custom Defense - Your Answer to APTs
sponsored by Trend Micro
VIDEO: Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
Posted: 17 Apr 2013 | Premiered: 17 Apr 2013

Trend Micro

Why Free Patch Management Tools Could Cost You More
sponsored by Lumension
WHITE PAPER: This white paper explores why so-called "free" patch management solutions could really end up costing your organization more in the long run.
Posted: 13 Jan 2012 | Published: 13 Jan 2012

Lumension