IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Windows Flaws

RSS Feed    Add to Google    Add to My Yahoo!
Windows Flaws White Papers (View All Report Types)
Audits, Compliance and Security: IT Pros Share Their Experience
sponsored by Dell Software
WHITE PAPER: In this white paper, IT pros share how a smarter approach to auditing enabled them to strengthen their security posture and simplify their change monitoring process.
Posted: 16 May 2014 | Published: 16 May 2014

Dell Software

Simplify IT Mobile Management: Enrolling New Windows 10 Devices
sponsored by Microsoft
WHITE PAPER: In this exclusive white paper, you will learn how Windows 10 will affect mobile device management (MDM) within your business. Read on to optimize your enterprise devices for Windows 10, and discover and manage security for existing enterprise apps.
Posted: 16 Nov 2015 | Published: 16 Nov 2015


Top 6 Security Considerations in Migrating to Microsoft Windows 10
sponsored by Absolute
WHITE PAPER: This white paper can help you make the migration to Windows 10 without sacrificing your security.
Posted: 05 Aug 2015 | Published: 05 Aug 2015


Guide: Patch Authority Ultimate
sponsored by ScriptLogic Corporation
WHITE PAPER: With exploits for known vulnerabilities unleashed on the Internet within as little as 5 days from the release of new patches from Microsoft, it is imperative your desktops and servers be regularly updated to keep them safe from attack.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

ScriptLogic Corporation

Best Practices for Windows Vista Planning, Migration, and Ongoing Management
sponsored by Symantec Corporation
WHITE PAPER: It is vital to ensure PC system and data security during migration to Windows Vista. This white paper highlights considerations that must be addressed over the entire migration process.
Posted: 02 Jul 2007 | Published: 01 Jun 2007

Symantec Corporation

What is FakeAV?
sponsored by Sophos UK
WHITE PAPER: Fake AntiVirus, also known as Rogue AntiVirus, Rogues, or ScareWare, is a class of malware that displays false alert messages to the victim concerning threats that do not really exist. This paper provides insight into where FakeAV comes from, what happens when a system is infected with FakeAV, and how users can protect themselves from FakeAV.
Posted: 07 Jun 2010 | Published: 07 Jun 2010

Sophos UK

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014)
sponsored by Webroot
WHITE PAPER: This resource outlines testing results of 8 competing endpoint security software products and breaks down how each perform in relation to a wide variety of criteria.
Posted: 18 Apr 2014 | Published: 28 Feb 2014


The Windows XP Era's Coming to an End: What You Can Do to Prepare
sponsored by Citrix
WHITE PAPER: This brief resource reviews the security threats and cost issues you will face following the end of support date.
Posted: 13 Dec 2013 | Published: 13 Dec 2013


Sharks in the AppPool: Managing Your Web Presence While Protecting the Hosting Resources You Pay For
sponsored by Verio
WHITE PAPER: This white paper details hosting best practices, discussing the advantages associated with the use of isolated, rather than shared, AppPools in a Windows-based hosting environment.
Posted: 27 Aug 2007 | Published: 01 Sep 2006


Seven for 7: Best Practices For Implementing Windows 7
sponsored by Sophos, Inc.
WHITE PAPER: In February 2011, Microsoft released its first major update to Windows 7, Service Pack 1. And now that this operating system holds more than 20% of marketshare, there’s no question that more enterprises will plan major migrations to Windows 7 in 2011. As businesses retire older versions of Windows, it’s the perfect opportunity to assess your...
Posted: 18 Mar 2011 | Published: 18 Mar 2011

Sophos, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement