IT Management  >   Systems Operations  >   Applications Management  >  

Security Patch Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Patch Management White Papers (View All Report Types)
 
Reinventing the Desktop
sponsored by Pano Logic, Inc
WHITE PAPER: Pano is a solution built specifically for desktop virtualization and it consists of a palm-sized device that connects a user's keyboard, mouse, monitor, and USB.
Posted: 28 Feb 2008 | Published: 01 Jan 2007

Pano Logic, Inc

Integrating Vulnerability Assessment and Remediation
sponsored by Lumension
WHITE PAPER: An outline for successfully integrating vulnerability scanning and remediation capabilities is presented in this whitepaper. This will ensure that organizations maintain a secure environment while complying with internal and external security policies.
Posted: 10 Jul 2008 | Published: 01 Oct 2007

Lumension

Desktop Virtualization: Overcoming Five Real-World Challenges
sponsored by Citrix
WHITE PAPER: This paper explores the most significant hurdles any desktop virtualization program needs to overcome. Staying focused on the ultimate goal--delivering core applications effectively to users--helps clarify the issues involved in desktop virtualization deployment.
Posted: 11 Sep 2009 | Published: 19 Jan 2009

Citrix

EMA Analyst Report on the Mobile Device Management Marketspace
sponsored by IBM
WHITE PAPER: Consult this informative white paper to gain better understanding of mobile device management with traditional desktop management capabilities. Use a consolidated endpoint management experience that can meet all enterprise challenges.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

IBM

Trend Micro’s End-to-End Vulnerability Management: A New Approach to Layered Security
sponsored by Trend Micro, Inc.
WHITE PAPER: An explosion in system and application vulnerabilities has been met with new ways to attack these weaknesses. In this paper, EMA analysts take a look at factors driving the need for increased security, and how new approaches to mitigating vulnerabilities such as virtual patching or remediation, provide more ways to deliver vulnerability management.
Posted: 31 Jan 2011 | Published: 31 Jan 2011

Trend Micro, Inc.

Five tips to reduce risk from modern web threats
sponsored by Sophos, Inc.
WHITE PAPER: To meet the challenges to your security, you need to put in place user education and awareness, preventive measures and a modern web security solution. This guide covers five essential preventive measures you should implement to reduce your risk and keep ahead of the threats.
Posted: 06 Apr 2012 | Published: 05 Apr 2012

Sophos, Inc.

Performance, Value and Protection for VMware View
sponsored by FalconStor Software
WHITE PAPER: Desktop virtualization is bringing a new approach to enterprise-wide desktop deployments aimed at providing a better end user and administrator experience than physical desktop deployments, by lowering acquisition and management cost, and offering a highly scalable, easy to deploy and fully protected desktop environment.
Posted: 25 Oct 2010 | Published: 25 Oct 2010

FalconStor Software

3 Strategies to Protect Endpoints from Risky Applications
sponsored by Lumension
WHITE PAPER: Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today’s IT environment. Read this white paper to learn more.
Posted: 10 Sep 2010 | Published: 10 Sep 2010

Lumension

Implementing an Effective Vulnerability Management Program
sponsored by Tenable Network Security
WHITE PAPER: Access this white paper to gain insight into best practices for continuous vulnerability management. Find out how you can ensure security of your systems and why you should be implementing continuous vulnerability management.
Posted: 24 Sep 2013 | Published: 24 Sep 2013

Tenable Network Security

Cyber Attacks on the Rise: IBM 2007 Report
sponsored by IBM
WHITE PAPER: This white paper shows how the IBM Internet Security Systems™ X-Force® research and development team discovered, analyzed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year.
Posted: 19 Nov 2007 | Published: 01 Aug 2007

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement