Host Vulnerability Assessment White Papers

(View All Report Types)
ForwardView: Four Areas of Security Vital to Business Health
sponsored by IBM
WHITE PAPER: Identifying areas of vulnerability can be increasingly challenging for small to mid-size businesses, but there are four areas – privacy, compliance, risk management and overall security capabilities – where information security is vital to business and profitability.
Posted: 15 Jun 2010 | Published: 08 Nov 2008

IBM

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Software Security Analysis: Control Flow Security Analysis with McCabe IQ
sponsored by McCabe Software, Inc.
WHITE PAPER: Read this white paper to learn how comprehensive security analysis equips you with the proper insight into the structure of your software code to identify and resolve possible security holes
Posted: 17 Apr 2012 | Published: 17 Apr 2012

McCabe Software, Inc.

Patch management: Fixing vulnerabilities before they are exploited
sponsored by GFI LanGuard
WHITE PAPER: Software updates are constant, and it's one of the most challeneging and resource-intensive tasks for an IT department. Securing vulnerabilities remains one of the most essential updates for IT pros. View this informative white paper to learn more about effective patch managment.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

GFI LanGuard

Acquire a global view of your organization's security state: the importance of security assessments
sponsored by IBM Software Group
WHITE PAPER: Security assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.
Posted: 09 Jan 2008 | Published: 09 Jan 2008

IBM Software Group

Avoiding the Top 5 Vulnerability Management Mistakes: The New Rules of Vulnerability Management
sponsored by eEye Digital Security
WHITE PAPER: In this guide, you’ll learn how to avoid the top five vulnerability management mistakes to protect critical IT assets and improve your security posture, while reducing costs. Read this paper to learn more.
Posted: 10 Jul 2010 | Published: 09 Jul 2010

eEye Digital Security

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.
Posted: 26 Mar 2009 | Published: 01 Apr 2008

Symantec Corporation

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance
sponsored by Rapid7
WHITE PAPER: Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.
Posted: 18 Jul 2012 | Published: 18 Jul 2012

Rapid7

Successfully Mitigating Corporate Risk
sponsored by AT&T Corp
WHITE PAPER: This paper discusses how to help reduce risk and successfully manage your security infrastructure through conducting vulnerability assessments, using discovery tools, adopting centralized policy setting and event correlation, and taking a cohesive approach to updating network equipment.
Posted: 06 Apr 2010 | Published: 05 Apr 2010

AT&T Corp

Next-Generation Vulnerability Management
sponsored by SAINT Corporation
WHITE PAPER: This crucial paper takes an in-depth look at how proper vulnerability management can protect business operations, mitigate risks, and improve overall IT management. Discover the latest solutions and strategies for ensuring your data is secure from attacks.
Posted: 12 Jul 2013 | Published: 12 Jul 2013

SAINT Corporation