IT Management  >   Systems Operations  >   Applications Management  >  

Security Patches

RSS Feed    Add to Google    Add to My Yahoo!
Security PatchesReports
 
Five Tips to Improve a Threat and Vulnerability Management Program
sponsored by Alert Logic
EGUIDE: This expert e-guide explains how to improve your enterprise's threat and vulnerability management program in 5 simple steps.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Alert Logic

Virtual Data Center E-Zine: Volume 39: Managing Virtualization Patches
sponsored by SearchDataCenter.com
EZINE: Keeping all of your patches up-to-date is a tedious but necessary task in order to ensure a fully protected data center. This dedicated e-zine highlights tips and strategies for making patch management easier and less time-consuming.
Posted: 05 Jun 2012 | Published: 05 Jun 2012

SearchDataCenter.com

Best Practices for Mobile Device Management
sponsored by SearchSecurity.com
EGUIDE: This e-guide from SearchConsumerization.com explores best practices for mobile device management in the enterprise and why your strategy must evolve as the phone technology does.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

SearchSecurity.com

Five tips to reduce risk from modern web threats
sponsored by Sophos, Inc.
WHITE PAPER: To meet the challenges to your security, you need to put in place user education and awareness, preventive measures and a modern web security solution. This guide covers five essential preventive measures you should implement to reduce your risk and keep ahead of the threats.
Posted: 06 Apr 2012 | Published: 05 Apr 2012

Sophos, Inc.

Select the Right Solution for Endpoint Management
sponsored by IBM
WHITE PAPER: This white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.
Posted: 09 Sep 2013 | Published: 31 May 2013

IBM

3 Strategies to Protect Endpoints from Risky Applications
sponsored by Lumension
WHITE PAPER: Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today’s IT environment. Read this white paper to learn more.
Posted: 10 Sep 2010 | Published: 10 Sep 2010

Lumension

Desktop Virtualization: Overcoming Five Real-World Challenges
sponsored by Citrix
WHITE PAPER: This paper explores the most significant hurdles any desktop virtualization program needs to overcome. Staying focused on the ultimate goal--delivering core applications effectively to users--helps clarify the issues involved in desktop virtualization deployment.
Posted: 11 Sep 2009 | Published: 19 Jan 2009

Citrix

Guide: Desktop Authority
sponsored by ScriptLogic Corporation
WHITE PAPER: Desktop Authority comprehensively manages the Windows desktop throughout the desktop lifecycle, reducing the total cost of desktop and application ownership.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

ScriptLogic Corporation

E-Book: Why a Windows 7 Upgrade is Worth It
sponsored by Kaseya
EBOOK: Microsoft Windows 7 addresses user frustrations, but satisfied users are just one benefit of migrating to the new operating system. These features can make it worth the investment. Read this new E-Book to learn more.
Posted: 17 Aug 2010 | Published: 17 Aug 2010

Kaseya

10 VDI Benefits You Can Achieve Without VDI
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: Discover how you can achieve VDI levels of manageability with traditional PCs in this resource.
Posted: 23 Dec 2011 | Published: 23 Dec 2011

Dell, Inc. and Intel®
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement