Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Vulnerability Management for Dummies guide available from Qualys.

Qualys : 16 April, 2008  (Technical Article)
IT network vulnerabilities explained clearly in "dummy" guide available from Qualys' stand at Infosecurity Europe and online.
Vulnerability Management for Dummies guide available from Qualys.
Qualys has teamed up with John Wiley and Sons to publish the first "Vulnerability Management For Dummies". This is the first accessible, easy-to-read and independently written guide to educate the uninitiated about this important security discipline. Copies will be available on the Qualys stand (G150) next week at Infosecurity Europe (22-24 April at Olympia)

Vulnerability management is defined as the systematic finding and elimination of weakspots or security flaws in an IT network.

Most of the successful attacks through a business network could be prevented with vulnerability management. This book is all about what you can do to manage vulnerabilities automatically and keep your network safe from attack. "Vulnerability Management For Dummies" simply explains the essential steps of vulnerability management and shows you how to select the right tools. In five succinct parts it leads the reader through an essential understanding of the need for vulnerability management and provides a guide to the essential best practice steps, the various options availability, the pros and cons of automated vulnerability management and finally provides a valuable ten-point checklist for removing vulnerabilities in the network.

"According to Gartner and industry luminaries, Vulnerability Management is the cornerstone of security and compliance best practices. It is an application that requires management, security and audit teams to collaborate with the production team to effectively identify and remediate security and compliance issues in a timely manner," said Philippe Courtot, CEO and chairman of Qualys. "Our goal in publishing this book in collaboration with our customers, which we are very thankful for, is to provide real-world examples on how do vulnerability management in order to address the security and compliance issues facing all of us."

An electronic version of the book will also be available to download on Tuesday 22 April.

Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo