IT Management  >   Systems Operations  >   Applications Management  >  

Software Patch Management

RSS Feed    Add to Google    Add to My Yahoo!
Software Patch Management White Papers (View All Report Types)
 
Five tips to reduce risk from modern web threats
sponsored by Sophos, Inc.
WHITE PAPER: To meet the challenges to your security, you need to put in place user education and awareness, preventive measures and a modern web security solution. This guide covers five essential preventive measures you should implement to reduce your risk and keep ahead of the threats.
Posted: 06 Apr 2012 | Published: 05 Apr 2012

Sophos, Inc.

WP #103: How Monitoring Systems Reduce Human Error in Distributed Server Rooms and Remote Wiring Closets
sponsored by Schneider Electric
WHITE PAPER: Access this white paper to learn how a basic monitoring and automation system can help reduce downtime incidents in your server room and remote wiring closet. Also inside, real-life horror stories from your peers and how they could have been prevented.
Posted: 02 May 2012 | Published: 02 May 2012

Schneider Electric

Intel Centrino Pro and Intel vPro Processor Technology
sponsored by Intel Corporation
WHITE PAPER: Learn how to improve security and management capabilities with Intel vPro processor technology. This white paper discusses how remote management can simplify systems management and save time for IT administrators.
Posted: 21 Nov 2007 | Published: 01 Nov 2007

Intel Corporation

Change is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network
sponsored by nCircle
WHITE PAPER: This document lists ten common changes in enterprise environments, all of which can chip away at your security and compliance in ways that you might not realize. Some are obvious; some are subtle; all can have a negative impact.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

nCircle

Improve Your Business through Best Practice IT Management
sponsored by Kaseya
WHITE PAPER: This white paper provides insight on ways that MSPs and IT departments can improve their management of services. Learn how using ITIL best practices with an automated management solution can address a number of the unique challenges these businesses face.
Posted: 08 Oct 2007 | Published: 01 Sep 2007

Kaseya

Data Sheet: What's New in Red Hat Satellite 5.6?
sponsored by Red Hat
WHITE PAPER: Discover the new Red Hat Satellite 5.6 capabilities and features that provide administrators with the means to efficiently manage their systems, lowering per-system deployment and management costs.
Posted: 24 Oct 2013 | Published: 24 Oct 2013

Red Hat

Best Practices in Lifecycle Management: Comparing Suites from Dell KACE, Symantec, LANDesk, and Microsoft
sponsored by Dell KACE
WHITE PAPER: This white paper points out the challenges of selecting a lifecycle management tool and presents a comparison of various technologies on the market. Explore 45 key features across seven areas, including discovery, inventory, asset management, and more.
Posted: 08 Aug 2011 | Published: 01 Jan 2011

Dell KACE

Implementing an Effective Vulnerability Management Program
sponsored by Tenable Network Security
WHITE PAPER: Access this white paper to gain insight into best practices for continuous vulnerability management. Find out how you can ensure security of your systems and why you should be implementing continuous vulnerability management.
Posted: 24 Sep 2013 | Published: 24 Sep 2013

Tenable Network Security

Integrating Vulnerability Assessment and Remediation
sponsored by Lumension
WHITE PAPER: An outline for successfully integrating vulnerability scanning and remediation capabilities is presented in this whitepaper. This will ensure that organizations maintain a secure environment while complying with internal and external security policies.
Posted: 10 Jul 2008 | Published: 01 Oct 2007

Lumension

Lumension Vulnerability Management - Automating the Vulnerability Management Lifecycle
sponsored by Lumension
WHITE PAPER: Learn how Lumension Vulnerability Management enables organizations to mitigate their critical risk by integrating the five phases of vulnerability management: discovering assets, assessing vulnerabilities and misconfigurations, prioritizing risks, remediating vulnerabilities and continuous reporting.
Posted: 12 Aug 2009 | Published: 01 Nov 2008

Lumension
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement