Rapid7

Displaying 1-6 of 6 results

  • White Papers // Nov 2009

    Protecting Patient Health Information in the HITECH Era: Security Challenges for Adopting Health Information Technology to Comply With HIPAA and the HITECH Act

    The American Healthcare system is getting a complete facelift thanks to incentives to adopt Health Information Technology introduced by the Health Information Technology for Economic and Clinical Health (HITECH) Act. Signed into law by President Barack Obama in February 2009, the HITECH Act is part of the American Recovery and...

    Provided By Rapid7

  • White Papers // Apr 2009

    Proactive Vulnerability Management Using Rapid7 NexPose

    The volatile network environment of most organizations requires organizations to proactively identify and remediate network vulnerabilities regularly to prevent hackers or disgruntled insiders from exploiting these network weaknesses. The process of identifying vulnerabilities, evaluating the risk, remediation and reporting is called vulnerability management. By using a formal vulnerability management process,...

    Provided By Rapid7

  • White Papers // Mar 2009

    IT Security in Higher Education

    The technology environment in higher education is complicated by many factors. First, there are often ambiguous campus perimeters. Many schools have a transient student population, and, even when this is not the case, computer equipment is often moved during the school year between campus and home. This situation is further...

    Provided By Rapid7

  • White Papers // Mar 2009

    Web Application Scanning: Securing Your Web Site From Malicious Intruders

    IT security and network administrators are responsible for protecting their networks and everything that runs on them, including Web applications. When there is a breach or an exploit, the responsible security team (or person) becomes the center of attention. This "Attention" comes with a high price tag; in 2007 alone,...

    Provided By Rapid7

  • White Papers // Mar 2009

    Securing Web 2.0 Applications: Closing the Door to Dangerous Visitors

    It wasn't long ago that many doubted the heavy use of JavaScript in corporate applications. Real enterprise applications were built using programming languages and client/server configurations. Web technologies have enabled the Internet to develop into an application platform, becoming the platform of choice for both internal and external corporate applications....

    Provided By Rapid7

  • White Papers // Mar 2009

    Using an Expert System for Deeper Vulnerability Scanning

    The objective of NeXpose is to provide a maximally invasive penetration of a set of computer systems using known and unknown vulnerabilities to access data and demonstrate how control of the system can be achieved. It is up to the user whether to choose the most invasive methods, or choose...

    Provided By Rapid7

  • White Papers // Apr 2009

    Proactive Vulnerability Management Using Rapid7 NexPose

    The volatile network environment of most organizations requires organizations to proactively identify and remediate network vulnerabilities regularly to prevent hackers or disgruntled insiders from exploiting these network weaknesses. The process of identifying vulnerabilities, evaluating the risk, remediation and reporting is called vulnerability management. By using a formal vulnerability management process,...

    Provided By Rapid7

  • White Papers // Nov 2009

    Protecting Patient Health Information in the HITECH Era: Security Challenges for Adopting Health Information Technology to Comply With HIPAA and the HITECH Act

    The American Healthcare system is getting a complete facelift thanks to incentives to adopt Health Information Technology introduced by the Health Information Technology for Economic and Clinical Health (HITECH) Act. Signed into law by President Barack Obama in February 2009, the HITECH Act is part of the American Recovery and...

    Provided By Rapid7

  • White Papers // Mar 2009

    Web Application Scanning: Securing Your Web Site From Malicious Intruders

    IT security and network administrators are responsible for protecting their networks and everything that runs on them, including Web applications. When there is a breach or an exploit, the responsible security team (or person) becomes the center of attention. This "Attention" comes with a high price tag; in 2007 alone,...

    Provided By Rapid7

  • White Papers // Mar 2009

    Securing Web 2.0 Applications: Closing the Door to Dangerous Visitors

    It wasn't long ago that many doubted the heavy use of JavaScript in corporate applications. Real enterprise applications were built using programming languages and client/server configurations. Web technologies have enabled the Internet to develop into an application platform, becoming the platform of choice for both internal and external corporate applications....

    Provided By Rapid7

  • White Papers // Mar 2009

    Using an Expert System for Deeper Vulnerability Scanning

    The objective of NeXpose is to provide a maximally invasive penetration of a set of computer systems using known and unknown vulnerabilities to access data and demonstrate how control of the system can be achieved. It is up to the user whether to choose the most invasive methods, or choose...

    Provided By Rapid7

  • White Papers // Mar 2009

    IT Security in Higher Education

    The technology environment in higher education is complicated by many factors. First, there are often ambiguous campus perimeters. Many schools have a transient student population, and, even when this is not the case, computer equipment is often moved during the school year between campus and home. This situation is further...

    Provided By Rapid7