Host Vulnerability Assessment White Papers

(View All Report Types)
Protecting the End User
sponsored by Proofpoint
WHITE PAPER: Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organization can take to build a people-centric defense.
Posted: 16 May 2024 | Published: 31 Jan 2019

Proofpoint

How To Achieve Risk-Based Vulnerability Management
sponsored by AT&T Cybersecurity
WHITE PAPER: Information overload challenges from data and threats can overwhelm cybersecurity professionals, causing many to unwisely skip vulnerability mitigation. Consequently, some organizations are operating at unacceptably high levels of risk. Read this guide to understand the framework of a modern, risk-based vulnerability management program.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

AT&T Cybersecurity

Gamania Group tightens security to strengthen game development capability
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Inside this white paper, read up on a gaming software company that was looking to expand in the market, but first turned to automated security management tools to ensure compliance and customer trust before moving forward.
Posted: 25 Sep 2013 | Published: 31 Oct 2012

Hewlett Packard Enterprise

ForwardView: Four Areas of Security Vital to Business Health
sponsored by IBM
WHITE PAPER: Identifying areas of vulnerability can be increasingly challenging for small to mid-size businesses, but there are four areas – privacy, compliance, risk management and overall security capabilities – where information security is vital to business and profitability.
Posted: 15 Jun 2010 | Published: 08 Nov 2008

IBM

Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity
sponsored by Information Security Magazine
WHITE PAPER: The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.
Posted: 21 Jul 2010 | Published: 21 Jul 2010

Information Security Magazine

Next-Generation Vulnerability Management
sponsored by SAINT Corporation
WHITE PAPER: This crucial paper takes an in-depth look at how proper vulnerability management can protect business operations, mitigate risks, and improve overall IT management. Discover the latest solutions and strategies for ensuring your data is secure from attacks.
Posted: 12 Jul 2013 | Published: 12 Jul 2013

SAINT Corporation

Patch management: Fixing vulnerabilities before they are exploited
sponsored by GFI LanGuard
WHITE PAPER: Software updates are constant, and it's one of the most challeneging and resource-intensive tasks for an IT department. Securing vulnerabilities remains one of the most essential updates for IT pros. View this informative white paper to learn more about effective patch managment.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

GFI LanGuard

Implementing an Effective Vulnerability Management Program
sponsored by Tenable
WHITE PAPER: Access this white paper to gain insight into best practices for continuous vulnerability management. Find out how you can ensure security of your systems and why you should be implementing continuous vulnerability management.
Posted: 24 Sep 2013 | Published: 24 Sep 2013

Tenable

The Use Case for Integrated Vulnerability Management CORE Security
sponsored by Core Security Technologies
WHITE PAPER: This white paper emphasizes the importance of an effective vulnerability management infrastructure to avoid data overload challenges and explores how to stay on track by consolidating, analyzing, and prioritizing data for maximum security.
Posted: 10 Oct 2013 | Published: 10 Oct 2013

Core Security Technologies

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM