Host Vulnerability Assessment White Papers

(View All Report Types)
Protecting the End User
sponsored by Proofpoint
WHITE PAPER: Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organization can take to build a people-centric defense.
Posted: 16 May 2024 | Published: 31 Jan 2019

Proofpoint

Symantec Intelligence Report - June 2013
sponsored by Symantec Corporation
WHITE PAPER: This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
Posted: 13 Aug 2013 | Published: 28 Jun 2013

Symantec Corporation

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

Drive business value with innovation for security defense
sponsored by IBM
WHITE PAPER: This white paper details an integrated approach to security that can help your company address security threats while supporting compliance and protecting data, Internet-based systems, physical environments and applications.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM

Acquire a global view of your organization's security state: the importance of security assessments
sponsored by IBM Software Group
WHITE PAPER: Security assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.
Posted: 09 Jan 2008 | Published: 09 Jan 2008

IBM Software Group

Report: Cyber Security Attack and Incident Data
sponsored by IBM
WHITE PAPER: Uncover analysis of security attack and incident data from IBM Security Services' plethora of data collected from their tens of billions of events monitored daily for their 3,700+ clients.
Posted: 15 May 2013 | Published: 29 Mar 2013

IBM

Discovering Vulnerable Web Applications
sponsored by Qualys
WHITE PAPER: This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
Posted: 15 Apr 2014 | Published: 31 Aug 2012

Qualys

Justification and ROI for Automated Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This paper will help you justify the need for an automated penetration testing product and demonstrate the positive Return on Investment (ROI) that can be achieved.
Posted: 19 Sep 2005 | Published: 01 Sep 2005

Core Security Technologies

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Software Security Analysis: Control Flow Security Analysis with McCabe IQ
sponsored by McCabe Software, Inc.
WHITE PAPER: Read this white paper to learn how comprehensive security analysis equips you with the proper insight into the structure of your software code to identify and resolve possible security holes
Posted: 17 Apr 2012 | Published: 17 Apr 2012

McCabe Software, Inc.