Vulnerability Management White Papers

(View All Report Types)
How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER: Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020

Veracode, Inc.

When Less Is More: Why Small Companies Should Think Outside the (Red/ Yellow) Box for Protecting Endpoints
sponsored by Sunbelt Software
WHITE PAPER: Endpoint security issues simply can't be ignored, regardless of the size of the organization. This paper will discuss how internet threats and vulnerabilities affect us all and what criteria businesses should use in order to pick out a proper endpoint security solution.
Posted: 30 Jul 2009 | Published: 30 Jul 2009

Sunbelt Software

The Top Five Virtualization Mistakes
sponsored by Vyatta Inc.
WHITE PAPER: This paper describes five mistakes common to many implementations of enterprise virtualization. Most of these mistakes relate to virtualization and networking infrastructure. Ideally, after reading this paper, you'll be sensitized to these issues so that you can plan for them and make your virtualization projects more successful.
Posted: 17 Jun 2009 | Published: 01 Jun 2007

Vyatta Inc.

Protection on demand: information security that works for you - instead of putting you to work.
sponsored by IBM
WHITE PAPER: Check out this white paper to learn more about the new approach to information security, protection on demand, which simplifies security and produces cost savings.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM

New Insider Threat Emerges in the New Economy
sponsored by Lumension
WHITE PAPER: Learn how employees and partners are engaging with IT assets and intellectual property.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Lumension

7 Essential Steps of Network Security
sponsored by Qualys
WHITE PAPER: This paper details the essential aspects of putting into place a measurable and sustainable 7 step vulnerability management program, and demonstrates how QualysGuard automates everything you need along the way.
Posted: 07 Nov 2008 | Published: 07 Nov 2008

Qualys

Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola Solutions
WHITE PAPER: This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007

Motorola Solutions

Symantec Internet Security Threat Report: Trends for July-December 07
sponsored by Symantec Corporation
WHITE PAPER: This summary of the Internet Security Threat Report will alert readers to current trends and impending threats that Symantec has observed for the six-month period from July 1 to December 31, 2007.
Posted: 18 Jun 2008 | Published: 01 Apr 2008

Symantec Corporation

Meeting the Payment Card Industry Data Security Standard
sponsored by Prism Microsystems Inc.
WHITE PAPER: Unlike many of the other compliance standards in use today PCI/DSS is explicit in its requirements and this paper identifies the specific requirements affecting network administrators and presents the EventTracker solution for these issues.
Posted: 30 May 2008 | Published: 08 Apr 2008

Prism Microsystems Inc.

Controlling Software Complexity: The Business Case for Static Source Code Analysis
sponsored by Coverity by Synopsys
WHITE PAPER: This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code.
Posted: 05 Mar 2008 | Published: 03 Mar 2008

Coverity by Synopsys

Ensuring Code Quality in Multi-threaded Applications: How to Eliminate Concurrency Defects with Static Analysis
sponsored by Coverity by Synopsys
WHITE PAPER: This paper will review the most common pitfalls that software developers face when creating multi-threaded applications. Discover how static analysis techniques can be used to eliminate concurrency defects earlier in the lifecycle.
Posted: 05 Mar 2008 | Published: 03 Mar 2008

Coverity by Synopsys

The Next Generation of Static Analysis: Boolean Satisfiability and Path Simulation
sponsored by Coverity by Synopsys
WHITE PAPER: This white paper will provide a brief overview of the history of static analysis and explain how the use of SAT in static analysis is enabling developers to improve the quality and security of their code.
Posted: 05 Mar 2008 | Published: 03 Mar 2008

Coverity by Synopsys

Intel Centrino Pro and Intel vPro Processor Technology
sponsored by Intel Corporation
WHITE PAPER: Learn how to improve security and management capabilities with Intel vPro processor technology. This white paper discusses how remote management can simplify systems management and save time for IT administrators.
Posted: 21 Nov 2007 | Published: 01 Nov 2007

Intel Corporation

Case Studies with Intel vPro Processor Technology
sponsored by Intel Corporation
WHITE PAPER: Read this white paper for an analysis of early testing for Intel vPro processor technology in IT departments. See real-world examples of how Intel vPro technology improves security due to the hardware based capabilities not possible with software a...
Posted: 21 Nov 2007 | Published: 21 Nov 2007

Intel Corporation

Cyber Attacks on the Rise: IBM 2007 Report
sponsored by IBM
WHITE PAPER: This white paper shows how the IBM Internet Security Systems™ X-Force® research and development team discovered, analyzed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year.
Posted: 19 Nov 2007 | Published: 01 Aug 2007

IBM

The Case for Application Security: How Real Is the Threat and What Are Your Options
sponsored by Fortify Software
WHITE PAPER: This white paper examines the current hacking landscape and details what you can do to prevent a security breach within your organization. Read this white paper today and learn about the pros and cons of various application security solutions.
Posted: 24 Oct 2007 | Published: 24 Oct 2007

Fortify Software

The High Stakes of Security: Protecting Your Brand
sponsored by IBM Software Group
WHITE PAPER: This white paper reviews a security approach that's integrated with your business strategy. Without this, you're risking a lot more than downtime or the simple loss of information assets or capital-you may be betting your organization...
Posted: 26 Jul 2007 | Published: 01 Dec 2006

IBM Software Group

A Pathway to PCI Compliance
sponsored by Imprivata
WHITE PAPER: This white paper examines the requirements of the PCI DSS and discusses the identity and access management technologies available to help your organization comply with these regulations in an efficient and cost-effective manner.
Posted: 29 Jun 2007 | Published: 01 Jun 2007

Imprivata

Ten Ways Hackers Breach Security
sponsored by Global Knowledge
WHITE PAPER: Hacking, cracking, and cyber crimes can wreak havoc on an organization. This white paper discusses ten common methods hackers use to breach your existing security, and what you can do to protect yourself.
Posted: 09 Feb 2007 | Published: 01 Jan 2007

Global Knowledge

Automated Penetration Testing; Can IT Afford Not To?
sponsored by Core Security Technologies
WHITE PAPER: This paper contains an overview of penetration testing, a summary of vulnerabilities that can be revealed through penetration testing, and the business and technical benefits of performing penetration testing across your infrastructure.
Posted: 18 Jan 2007 | Published: 01 Jan 2007

Core Security Technologies