IT Management  >   Systems Operations  >   Applications Management  >  

Security Patch Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Patch Management Reports
 
Virtualization Security: Protecting Virtualized Environments
sponsored by ComputerWeekly.com
BOOK: This extract from the book Virtualization Security, includes a 30% discount for Computer Weekly readers.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

ComputerWeekly.com

E-Guide: Tips for creating a VDI backup plan
sponsored by Dell and VMware
EGUIDE: This e-guide from SearchVirtualDesktop.com explains how to develop a VDI backup plan to protect your virtual desktops against disaster. Learn why it is essential to focus on both the virtual desktops and the infrastructure when developing a backup strategy.
Posted: 06 Apr 2011 | Published: 06 Apr 2011

Dell and VMware

Presentation Transcript: Overcoming the Challenges with Configuration and Patch Mgmt
sponsored by BigFix
PRESENTATION TRANSCRIPT: In this presentation transcript, you’ll gain insight on how to improve your asset discovery processes, determine the patch level of the machines in your environment, and improve testing and deployment processes to keep pace with Patch Tuesday and quarterly Oracle and Adobe releases.
Posted: 02 Nov 2010 | Published: 01 Nov 2010

BigFix

Shavlik Customer Update: What is the Conficker worm, referred to as "Downadup"?
sponsored by Shavlik Technologies
WHITE PAPER: This paper describes the risks posed by the Downadup worm and how Shavlik is uniquely suited to help customers respond quickly. Read this brief paper to learn how Shavlik makes it easy for users to do targeted installation of solutions that automate and control patch and configuration management processes while minimizing operational impact.
Posted: 11 Feb 2009 | Published: 11 Feb 2009

Shavlik Technologies

Understanding and Selecting a Database Assessment Solution
sponsored by Application Security, Inc.
ANALYST REPORT: In this analyst report, Securosis’ Adrian Lane explores the inner workings of assessment tools and the business value they provide, and will make specific recommendations on evaluating, purchasing, and deploying Database Assessment.
Posted: 21 Feb 2010 | Published: 22 Feb 2010

Application Security, Inc.

Lumension Vulnerability Management - Automating the Vulnerability Management Lifecycle
sponsored by Lumension
WHITE PAPER: Learn how Lumension Vulnerability Management enables organizations to mitigate their critical risk by integrating the five phases of vulnerability management: discovering assets, assessing vulnerabilities and misconfigurations, prioritizing risks, remediating vulnerabilities and continuous reporting.
Posted: 12 Aug 2009 | Published: 01 Nov 2008

Lumension

TechFocus: Windows 7 Migration - Why a Windows 7 Upgrade Is Worth It
sponsored by Dell EMC and Microsoft
EGUIDE: Microsoft Windows 7 addresses user frustrations, but satisfied users are just one benefit of migrating to the new operating system. This expert guide will discuss key features that can make a Windows 7 migration worth the investment.
Posted: 02 Dec 2010 | Published: 02 Dec 2010

Dell EMC and Microsoft

Intel Centrino Pro and Intel vPro Processor Technology
sponsored by Intel Corporation
WHITE PAPER: Learn how to improve security and management capabilities with Intel vPro processor technology. This white paper discusses how remote management can simplify systems management and save time for IT administrators.
Posted: 21 Nov 2007 | Published: 01 Nov 2007

Intel Corporation

E Is for Endpoint: Six Security Strategies for Highly Effective IT Professionals
sponsored by Lumension
WHITE PAPER: Security professionals know that effective endpoint protection calls for a layered, defense-in-depth approach. But endpoint security now requires a new way of thinking that goes beyond just battling threats to actually enable operational improvement. Read this whitepaper to learn the six steps you need to think different about endpoint security.
Posted: 23 Jan 2012 | Published: 23 Jan 2012

Lumension

Trend Micro’s End-to-End Vulnerability Management: A New Approach to Layered Security
sponsored by Trend Micro, Inc.
WHITE PAPER: An explosion in system and application vulnerabilities has been met with new ways to attack these weaknesses. In this paper, EMA analysts take a look at factors driving the need for increased security, and how new approaches to mitigating vulnerabilities such as virtual patching or remediation, provide more ways to deliver vulnerability management.
Posted: 31 Jan 2011 | Published: 31 Jan 2011

Trend Micro, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement