IT Management  >   Systems Operations  >   Applications Management  >  

Security Patch Management

RSS Feed    Add to Google    Add to My Yahoo!
Security Patch Management Reports
 
Web Application Firewalls: Patching, SDLC Key for Security, Compliance
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

SearchSecurity.com

Understanding Advanced Virtualization Security Practices
sponsored by Intel
EBOOK: SearchCloudSecurity.com presents a comprehensive guide to virtualization security. Our experts help you assess and prioritize the risks and threats to virtual environments. You’ll learn what steps you must take to handle secure multitenancy, hypervisor threats and hypervisor protection, and data management service security.
Posted: 19 Aug 2011 | Published: 18 Aug 2011

Intel

A Business-Driven Approach to Mobile Enterprise Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: Prepare your organization for the consumerization of IT and BYOD with the help of this resource. Uncover details about mobile enterprise policy creation, security monitoring, network and security infrastructure, and more.
Posted: 11 May 2012 | Published: 11 May 2012

Juniper Networks, Inc.

Patch management: Fixing vulnerabilities before they are exploited
sponsored by GFI LanGuard
WHITE PAPER: Software updates are constant, and it's one of the most challeneging and resource-intensive tasks for an IT department. Securing vulnerabilities remains one of the most essential updates for IT pros. View this informative white paper to learn more about effective patch managment.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

GFI LanGuard

Endpoint Security: Visible Coverage in a Single, Scalable Platform
sponsored by Trend Micro, Inc.
DATA SHEET: Read this brief data sheet to learn how Trend Micro's Endpoint Security Platform delivers pervasive visibility and control, speeds time to protection, and increases management efficiency.
Posted: 24 Aug 2009 | Published: 06 Jan 2009

Trend Micro, Inc.

Reinventing the Desktop
sponsored by Pano Logic, Inc
WHITE PAPER: Pano is a solution built specifically for desktop virtualization and it consists of a palm-sized device that connects a user's keyboard, mouse, monitor, and USB.
Posted: 28 Feb 2008 | Published: 01 Jan 2007

Pano Logic, Inc

Windows 7 Security: A Great Leap Forward or Business as Usual?
sponsored by Sophos, Inc.
WHITE PAPER: Debates and discussions about the new Windows 7 have been raging on the security improvements in the new platform, and some potential problems have also emerged. In this white paper, we run through the most significant changes and additions, and look at what they might mean to users and administrators.
Posted: 13 Oct 2009 | Published: 13 Oct 2009

Sophos, Inc.

E-Book: Technical Guide on Vulnerability Management
sponsored by SearchSecurity.com
EBOOK: SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state.
Posted: 03 Jun 2010 | Published: 03 Jun 2010

SearchSecurity.com

BDNA for Security: Strengthened Security Through Visibility
sponsored by BDNA
WHITE PAPER: Lack of visibility is the root cause for security breaches. Without the enhanced protection of the latest discovery applications, your entire network will be exposed to high risk, lower revenue and lost customers. Read now to learn how the right discovery solutions offer enhanced and automated protection for your infrastructure.
Posted: 07 Jun 2011 | Published: 07 Jun 2011

BDNA

Desktop Virtualization: Overcoming Five Real-World Challenges
sponsored by Citrix
WHITE PAPER: This paper explores the most significant hurdles any desktop virtualization program needs to overcome. Staying focused on the ultimate goal--delivering core applications effectively to users--helps clarify the issues involved in desktop virtualization deployment.
Posted: 11 Sep 2009 | Published: 19 Jan 2009

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement