Home | About | Publishers | Advertisers | Contact | Directory
Your Research Library for Finding Relevant BtoB Whitepapers, Webinars, eBooks, and Digital Content

Find Research


Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

security assessment testing

Results 1 - 6 of 6Sort Results By: Published Date | Title | Company Name
Published By: SecureAuth     Published Date: Nov 13, 2017
A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, services and application flaws, improper configurations or risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as, end-user adherence to security policies. This eBook provides a simple guide to explain both penetration testing's purpose and a basic guide to getting you there. Download now and start testing your network today.
Tags : 
    
SecureAuth
Published By: BAE Systems     Published Date: Jan 06, 2016
For most financial institutions, it’s no longer a question of ‘if’ but ‘when’ they’ll be attacked.. If you’re like most financial institutions, you have controls that identify breaches, but need proper procedures that’ll enable you to recover from such an event. In this presentation at the CUNA Technology Council Conference, Tom Neclerio, BAE Systems’ VP of Cyber Consulting Services, discusses the current threats across the financial marketplace and explores strategies for implementing a successful incident response program as outlined in the FFIEC’s cyber resilience guidance.
Tags : 
bae systems, applied intelligence, cyber security, cyber resilience, incident response, financial institution, data breach, cyber attack, ffiec, compliance, regulations, security challenges, regulatory compliance, cyber professional services, risk assessment, vulnerability, penetration testing, crimeware, phishing, critical infrastructure
    
BAE Systems
Published By: Rapid7     Published Date: May 22, 2012
The ongoing struggle to prevent hackers from breaching assets and malware from gaining a foothold requires a vulnerability management strategy that begins with a comprehensive measurement of security risk. Organizations must examine the entire IT stack, including the operating system, network, applications, and databases. These new technologies include dynamic, virtualized environments and services outside traditional physical IT infrastructures, such as virtualized, cloud-based services and social networking.
Tags : 
security, risk management, security intelligence, security assessment, prevent data breach, cyber security, vulnerability management, penetration testing, data breach, breach, access control, anti spam, anti spyware, security management
    
Rapid7
Published By: Intermedia     Published Date: Nov 10, 2008
Microsoft Exchange is the leading business email and collaboration solution for the small,up to the large, business markets, and this whitepaper compares the security of Microsoft Exchange Services deployed in-house versus a hosted model with SaaS service providers. By choosing Intermedia as their Hosted Exchange SaaS Solution Provider, businesses can achieve email and total messaging security, as well as a piece of mind, by leveraging Intermedia’s infrastructure and experience with running a secured messaging platform.
Tags : 
intermedia, email security, logical server security, software as a service, saas, microsoft exchange services, security assessment testing, security, microsoft exchange
    
Intermedia
Published By: SilverSky     Published Date: Apr 16, 2013
Threats to the security of your network will never completely go away, but the ability to prepare for, recognize and quickly remediate these threats should be a part of day-to-day company operations. This white paper gives you eight essentials for managing vulnerabilities in a network including internal and external assessments, how frequently you should run scans for threats and the importance of broadening testing beyond basic network services and operating systems.
Tags : 
vulnerability management, security, threat management, security, assessment, anti spam, anti spyware, anti virus, auditing, compliance, email security, encryption, hacker detection, high availability, identity management, intrusion detection, intrusion prevention, security management
    
SilverSky
Published By: TraceSecurity     Published Date: Sep 15, 2010
This paper defines the different types of penetration tests, explains why the tests should be performed, details their benefits and even provides guidance for choosing the right vendor.
Tags : 
penetration, test, pen, tracesecurity, risk, assessment, social, engineering, internal, external, web application, network, security, secure, vulnerability, threat, identify, glba, compliance, testing
    
TraceSecurity
Search Research