IT Management  >   Systems Operations  >   Applications Management  >  

Security Patch Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Patch Management White Papers (View All Report Types)
 
Five tips to reduce risk from modern web threats
sponsored by Sophos, Inc.
WHITE PAPER: User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Sophos, Inc.

SymEd Solutions from Symantec: Endpoint Management and Mobility
sponsored by Insight Public Sector and Symantec
WHITE PAPER: Uncover how to safely deploy IT in academia and revolutionize the experience of students and teachers alike without compromising security in today's threat-filled landscape.
Posted: 29 Apr 2013 | Published: 31 Dec 2012

Insight Public Sector and Symantec

Windows 7 Security: A Great Leap Forward or Business as Usual?
sponsored by Sophos, Inc.
WHITE PAPER: Debates and discussions about the new Windows 7 have been raging on the security improvements in the new platform, and some potential problems have also emerged. In this white paper, we run through the most significant changes and additions, and look at what they might mean to users and administrators.
Posted: 13 Oct 2009 | Published: 13 Oct 2009

Sophos, Inc.

Patch management: Fixing vulnerabilities before they are exploited
sponsored by GFI LanGuard
WHITE PAPER: Software updates are constant, and it's one of the most challeneging and resource-intensive tasks for an IT department. Securing vulnerabilities remains one of the most essential updates for IT pros. View this informative white paper to learn more about effective patch managment.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

GFI LanGuard

Vulnerability Management: Making Risk Visible and Remediation Automatic
sponsored by Shavlik Technologies
WHITE PAPER: This paper details how to set vulnerability management policies and identify risks within your organization. You will also learn more about how to detect and remediate patch or configuration problems.
Posted: 01 May 2007 | Published: 01 Apr 2007

Shavlik Technologies

The Essential Elements of Comprehensive Endpoint Security
sponsored by Symantec Corporation
WHITE PAPER: Establishing a comprehensive endpoint security solution is a complicated undertaking. This paper will clarify the various aspects of the endpoint security problem and identify the functional requirements of a comprehensive endpoint security solution.
Posted: 27 Mar 2006 | Published: 01 Feb 2006

Symantec Corporation

Change is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network
sponsored by nCircle
WHITE PAPER: This document lists ten common changes in enterprise environments, all of which can chip away at your security and compliance in ways that you might not realize. Some are obvious; some are subtle; all can have a negative impact.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

nCircle

Best Practices in Lifecycle Management: Comparing KACE, Altiris, LANDesk, and Microsoft SMS
sponsored by KACE
WHITE PAPER: This Enterprise Management Associates (EMA) white paper explains key best practices in lifecycle management, uses these as a framework for functional comparison, and includes a cost comparison to determine overall solution value.
Posted: 06 Nov 2008 | Published: 01 Jan 2007

KACE

Four Steps to Cure Your Patch Management Headache
sponsored by Lumension
WHITE PAPER: The need to speed up patch deployment across today’s highly complex and distributed IT environment has never been more important. Read this free white paper and learn four steps to cure your patch management headache.
Posted: 06 Jan 2011 | Published: 06 Jan 2011

Lumension

Implementing an Effective Vulnerability Management Program
sponsored by Tenable Network Security
WHITE PAPER: Access this white paper to gain insight into best practices for continuous vulnerability management. Find out how you can ensure security of your systems and why you should be implementing continuous vulnerability management.
Posted: 24 Sep 2013 | Published: 24 Sep 2013

Tenable Network Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement